Lookup for vulnerable packages by Package URL.
| Purl | pkg:rpm/redhat/openvswitch2.13@2.13.0-25.el8fdp?arch=1 |
| Type | rpm |
| Namespace | redhat |
| Name | openvswitch2.13 |
| Version | 2.13.0-25.el8fdp |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-9xpq-nv7z-wyhb |
| vulnerability_id |
VCID-9xpq-nv7z-wyhb |
| summary |
dpdk: librte_vhost Missing inputs validation in Vhost-crypto |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10724 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23738 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23855 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23895 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23685 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23755 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23816 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23772 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23715 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23725 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23714 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0008 |
| scoring_system |
epss |
| scoring_elements |
0.23692 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10724 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10724
|
| risk_score |
2.3 |
| exploitability |
0.5 |
| weighted_severity |
4.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9xpq-nv7z-wyhb |
|
| 1 |
| url |
VCID-a6u2-jbgk-sqas |
| vulnerability_id |
VCID-a6u2-jbgk-sqas |
| summary |
dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.6957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69583 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69599 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69578 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69628 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69667 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69652 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69638 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69679 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.69688 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00606 |
| scoring_system |
epss |
| scoring_elements |
0.6967 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10725 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10725
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a6u2-jbgk-sqas |
|
| 2 |
| url |
VCID-n7c7-rw39-kucj |
| vulnerability_id |
VCID-n7c7-rw39-kucj |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10722 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33422 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33561 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33594 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33477 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.3351 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33514 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33472 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33483 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33458 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33425 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10722 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10722
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n7c7-rw39-kucj |
|
| 3 |
| url |
VCID-xdnp-mb3d-qqej |
| vulnerability_id |
VCID-xdnp-mb3d-qqej |
| summary |
dpdk: librte_vhost VHOST_USER_GET_INFLIGHT_FD message flooding to result in a DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10726 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29687 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.2974 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29786 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29605 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29667 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29705 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29663 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29613 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29631 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29607 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29561 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10726 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10726
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xdnp-mb3d-qqej |
|
| 4 |
| url |
VCID-xxh9-badb-ubdb |
| vulnerability_id |
VCID-xxh9-badb-ubdb |
| summary |
dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10723 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33422 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33561 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33594 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33433 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33477 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.3351 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33514 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33472 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33483 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33458 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00137 |
| scoring_system |
epss |
| scoring_elements |
0.33425 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10723 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10723
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xxh9-badb-ubdb |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.5 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openvswitch2.13@2.13.0-25.el8fdp%3Farch=1 |