Search for vulnerabilities
Vulnerability details: VCID-h8nb-ws34-aaam
Vulnerability ID VCID-h8nb-ws34-aaam
Aliases CVE-2022-38013
GHSA-r8m2-4x37-6592
Summary .NET Denial of Service Vulnerability
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38013.json
epss 0.00067 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00088 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00318 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.00409 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01307 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.01343 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
epss 0.04077 https://api.first.org/data/v1/epss?cve=CVE-2022-38013
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-r8m2-4x37-6592
cvssv3.1 7.5 https://github.com/dotnet/aspnetcore
cvssv3.1 8.1 https://github.com/dotnet/aspnetcore
generic_textual HIGH https://github.com/dotnet/aspnetcore
cvssv3.1 7.5 https://github.com/dotnet/aspnetcore/security/advisories/GHSA-r8m2-4x37-6592
cvssv3.1_qr HIGH https://github.com/dotnet/aspnetcore/security/advisories/GHSA-r8m2-4x37-6592
generic_textual HIGH https://github.com/dotnet/aspnetcore/security/advisories/GHSA-r8m2-4x37-6592
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
cvssv3.1 7.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
cvssv3.1 7.5 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013
generic_textual HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-38013
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-38013
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2022-38013
cvssv3.1 7.5 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013
generic_textual HIGH https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38013.json
https://api.first.org/data/v1/epss?cve=CVE-2022-38013
https://github.com/dotnet/aspnetcore
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013
2125124 https://bugzilla.redhat.com/show_bug.cgi?id=2125124
cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:6.0.0:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_core:3.1:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:16.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2019:16.11:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2019:16.9:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:mac:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.3:*:*:*:*:mac:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
CVE-2022-38013 https://nvd.nist.gov/vuln/detail/CVE-2022-38013
CVE-2022-38013 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013
GHSA-r8m2-4x37-6592 https://github.com/advisories/GHSA-r8m2-4x37-6592
GHSA-r8m2-4x37-6592 https://github.com/dotnet/aspnetcore/security/advisories/GHSA-r8m2-4x37-6592
RHSA-2022:6520 https://access.redhat.com/errata/RHSA-2022:6520
RHSA-2022:6521 https://access.redhat.com/errata/RHSA-2022:6521
RHSA-2022:6522 https://access.redhat.com/errata/RHSA-2022:6522
RHSA-2022:6523 https://access.redhat.com/errata/RHSA-2022:6523
RHSA-2022:6539 https://access.redhat.com/errata/RHSA-2022:6539
USN-5609-1 https://usn.ubuntu.com/5609-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38013.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/dotnet/aspnetcore
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Found at https://github.com/dotnet/aspnetcore
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/dotnet/aspnetcore/security/advisories/GHSA-r8m2-4x37-6592
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2CUL3Z7MEED7RFQZVGQL2MTKSFFZKAAY
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HCV4TQGOTOFHO5ETRKGFKAGYV2YAUVE
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JA6F4CDKLI3MALV6UK3P2DR5AGCLTT7Y
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4K5YL7USOKIR3O2DUKBZMYPWXYPDKXG
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WL334CKOHA6BQQSYJW365HIWJ4IOE45M
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-38013
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-38013
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-38013
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.31876
EPSS Score 0.00067
Published At Jan. 16, 2025, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.