Search for vulnerabilities
Vulnerability details: VCID-w5yp-hysy-aaae
Vulnerability ID VCID-w5yp-hysy-aaae
Aliases CVE-2022-31160
GHSA-h6gj-6jjq-h8g9
Summary jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities will make them erroneously get decoded. This can lead to potentially executing JavaScript code. The bug has been patched in jQuery UI 1.13.2. To remediate the issue, someone who can change the initial HTML can wrap all the non-input contents of the `label` in a `span`.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 6.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31160.json
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00222 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00299 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00299 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00299 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.00299 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06102 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06584 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06603 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06603 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.06603 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.07185 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.07185 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
epss 0.22799 https://api.first.org/data/v1/epss?cve=CVE-2022-31160
cvssv3.1 6.1 https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released
generic_textual MODERATE https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released
cvssv3.1 6.1 https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
ssvc Track https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=2110705
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-h6gj-6jjq-h8g9
cvssv3.1 6.1 https://github.com/jquery/jquery-ui
generic_textual MODERATE https://github.com/jquery/jquery-ui
cvssv3.1 6.1 https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
generic_textual MODERATE https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
ssvc Track https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
cvssv3.1 6.1 https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
cvssv3.1_qr MODERATE https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
generic_textual MODERATE https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
ssvc Track https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
cvssv3.1 6.1 https://github.com/jquery-ui-rails/jquery-ui-rails/blob/master/VERSIONS.md
generic_textual MODERATE https://github.com/jquery-ui-rails/jquery-ui-rails/blob/master/VERSIONS.md
cvssv3.1 6.1 https://github.com/jquery-ui-rails/jquery-ui-rails/releases/tag/v8.0.0-release
generic_textual MODERATE https://github.com/jquery-ui-rails/jquery-ui-rails/releases/tag/v8.0.0-release
cvssv3.1 6.1 https://lists.debian.org/debian-lts-announce/2022/12/msg00015.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2022/12/msg00015.html
ssvc Track https://lists.debian.org/debian-lts-announce/2022/12/msg00015.html
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD/
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO/
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6/
ssvc Track https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6/
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO
cvssv3.1 6.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6
cvssv3 6.1 https://nvd.nist.gov/vuln/detail/CVE-2022-31160
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2022-31160
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2022-31160
cvssv3.1 6.1 https://security.netapp.com/advisory/ntap-20220909-0007
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20220909-0007
cvssv3.1 6.1 https://security.netapp.com/advisory/ntap-20220909-0007/
ssvc Track https://security.netapp.com/advisory/ntap-20220909-0007/
cvssv3.1 6.1 https://www.drupal.org/sa-contrib-2022-052
generic_textual MODERATE https://www.drupal.org/sa-contrib-2022-052
ssvc Track https://www.drupal.org/sa-contrib-2022-052
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31160.json
https://api.first.org/data/v1/epss?cve=CVE-2022-31160
https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released
https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31160
https://github.com/jquery/jquery-ui
https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
https://github.com/jquery-ui-rails/jquery-ui-rails/blob/master/VERSIONS.md
https://github.com/jquery-ui-rails/jquery-ui-rails/releases/tag/v8.0.0-release
https://lists.debian.org/debian-lts-announce/2022/12/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6/
https://security.netapp.com/advisory/ntap-20220909-0007
https://security.netapp.com/advisory/ntap-20220909-0007/
https://www.drupal.org/sa-contrib-2022-052
1015982 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015982
2110705 https://bugzilla.redhat.com/show_bug.cgi?id=2110705
cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.0:*:*:*:*:drupal:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.0:*:*:*:*:drupal:*:*
cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.1:*:*:*:*:drupal:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.1:*:*:*:*:drupal:*:*
cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.2:*:*:*:*:drupal:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.2:*:*:*:*:drupal:*:*
cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.3:*:*:*:*:drupal:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:jquery_ui_checkboxradio:8.x-1.3:*:*:*:*:drupal:*:*
cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
CVE-2022-31160 https://nvd.nist.gov/vuln/detail/CVE-2022-31160
GHSA-h6gj-6jjq-h8g9 https://github.com/advisories/GHSA-h6gj-6jjq-h8g9
GHSA-h6gj-6jjq-h8g9 https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
USN-6419-1 https://usn.ubuntu.com/6419-1/
USN-USN-5181-1 https://usn.ubuntu.com/USN-5181-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31160.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://blog.jqueryui.com/2022/07/jquery-ui-1-13-2-released/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery/jquery-ui
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery-ui-rails/jquery-ui-rails/blob/master/VERSIONS.md
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://github.com/jquery-ui-rails/jquery-ui-rails/releases/tag/v8.0.0-release
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2022/12/msg00015.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://lists.debian.org/debian-lts-announce/2022/12/msg00015.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XBR3G3JR5ZIOJDO4224M3INXDS2VFDD
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5LGNTICB5BRFAG3DHVVELS6H3CZSQMO
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB2FJQXCNHO32VGVOC6DY6IPGVE4VDU6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-31160
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-31160
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://security.netapp.com/advisory/ntap-20220909-0007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://security.netapp.com/advisory/ntap-20220909-0007/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://security.netapp.com/advisory/ntap-20220909-0007/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://www.drupal.org/sa-contrib-2022-052
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:45:27Z/ Found at https://www.drupal.org/sa-contrib-2022-052
Exploit Prediction Scoring System (EPSS)
Percentile 0.60890
EPSS Score 0.00222
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.