Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/dpdk@20.11.10-1~deb11u1
Typedeb
Namespacedebian
Namedpdk
Version20.11.10-1~deb11u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version24.11.4-0+deb13u1
Latest_non_vulnerable_version24.11.4-0+deb13u1
Affected_by_vulnerabilities
0
url VCID-hf2x-6f8d-c7er
vulnerability_id VCID-hf2x-6f8d-c7er
summary NVIDIA Mellanox DPDK contains a vulnerability in Poll Mode Driver (PMD), where an attacker on a VM in the system might be able to cause information disclosure and denial of service on the network interface.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-23259
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12651
published_at 2026-04-12T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12691
published_at 2026-04-11T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12633
published_at 2026-04-21T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12518
published_at 2026-04-18T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12511
published_at 2026-04-16T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12606
published_at 2026-04-13T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13305
published_at 2026-04-07T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13446
published_at 2026-04-02T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13512
published_at 2026-04-04T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13387
published_at 2026-04-08T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13437
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-23259
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23259
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://nvidia.custhelp.com/app/answers/detail/a_id/5655
reference_id 5655
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T18:51:38Z/
url https://nvidia.custhelp.com/app/answers/detail/a_id/5655
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-23259
reference_id CVE-2025-23259
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T18:51:38Z/
url https://nvd.nist.gov/vuln/detail/CVE-2025-23259
5
reference_url https://www.cve.org/CVERecord?id=CVE-2025-23259
reference_id CVERecord?id=CVE-2025-23259
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-04T18:51:38Z/
url https://www.cve.org/CVERecord?id=CVE-2025-23259
6
reference_url https://usn.ubuntu.com/7816-1/
reference_id USN-7816-1
reference_type
scores
url https://usn.ubuntu.com/7816-1/
fixed_packages
0
url pkg:deb/debian/dpdk@24.11.4-0%2Bdeb13u1
purl pkg:deb/debian/dpdk@24.11.4-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@24.11.4-0%252Bdeb13u1
aliases CVE-2025-23259
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hf2x-6f8d-c7er
Fixing_vulnerabilities
0
url VCID-35ue-vw4t-sqbg
vulnerability_id VCID-35ue-vw4t-sqbg
summary DPDK: out-of-bounds read/write in vhost_user_set_inflight_fd() may lead to crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3839.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3839
reference_id
reference_type
scores
0
value 0.00474
scoring_system epss
scoring_elements 0.64679
published_at 2026-04-01T12:55:00Z
1
value 0.00474
scoring_system epss
scoring_elements 0.64769
published_at 2026-04-08T12:55:00Z
2
value 0.00474
scoring_system epss
scoring_elements 0.64762
published_at 2026-04-13T12:55:00Z
3
value 0.00474
scoring_system epss
scoring_elements 0.648
published_at 2026-04-16T12:55:00Z
4
value 0.00474
scoring_system epss
scoring_elements 0.64811
published_at 2026-04-18T12:55:00Z
5
value 0.00474
scoring_system epss
scoring_elements 0.64731
published_at 2026-04-02T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.64759
published_at 2026-04-04T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.64722
published_at 2026-04-07T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64784
published_at 2026-04-09T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64801
published_at 2026-04-11T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.6479
published_at 2026-04-12T12:55:00Z
11
value 0.00592
scoring_system epss
scoring_elements 0.69273
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3839
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3839
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0669
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010641
reference_id 1010641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2025882
reference_id 2025882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2025882
7
reference_url https://security.archlinux.org/AVG-2697
reference_id AVG-2697
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2697
8
reference_url https://access.redhat.com/errata/RHSA-2022:4786
reference_id RHSA-2022:4786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4786
9
reference_url https://access.redhat.com/errata/RHSA-2022:4787
reference_id RHSA-2022:4787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4787
10
reference_url https://access.redhat.com/errata/RHSA-2022:4788
reference_id RHSA-2022:4788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4788
11
reference_url https://access.redhat.com/errata/RHSA-2022:8263
reference_id RHSA-2022:8263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8263
12
reference_url https://usn.ubuntu.com/5401-1/
reference_id USN-5401-1
reference_type
scores
url https://usn.ubuntu.com/5401-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2021-3839
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-35ue-vw4t-sqbg
1
url VCID-4swn-75b9-wfa2
vulnerability_id VCID-4swn-75b9-wfa2
summary dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2132.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2132.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2132
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67578
published_at 2026-04-21T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69425
published_at 2026-04-16T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69436
published_at 2026-04-18T12:55:00Z
3
value 0.0078
scoring_system epss
scoring_elements 0.73635
published_at 2026-04-07T12:55:00Z
4
value 0.0078
scoring_system epss
scoring_elements 0.7367
published_at 2026-04-08T12:55:00Z
5
value 0.0078
scoring_system epss
scoring_elements 0.73683
published_at 2026-04-09T12:55:00Z
6
value 0.0078
scoring_system epss
scoring_elements 0.73705
published_at 2026-04-11T12:55:00Z
7
value 0.0078
scoring_system epss
scoring_elements 0.73688
published_at 2026-04-12T12:55:00Z
8
value 0.0078
scoring_system epss
scoring_elements 0.73679
published_at 2026-04-13T12:55:00Z
9
value 0.0078
scoring_system epss
scoring_elements 0.73638
published_at 2026-04-02T12:55:00Z
10
value 0.0078
scoring_system epss
scoring_elements 0.73662
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2132
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019589
reference_id 1019589
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019589
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099475
reference_id 2099475
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099475
7
reference_url https://access.redhat.com/errata/RHSA-2022:6382
reference_id RHSA-2022:6382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6382
8
reference_url https://access.redhat.com/errata/RHSA-2022:6383
reference_id RHSA-2022:6383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6383
9
reference_url https://access.redhat.com/errata/RHSA-2022:6384
reference_id RHSA-2022:6384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6384
10
reference_url https://access.redhat.com/errata/RHSA-2022:6385
reference_id RHSA-2022:6385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6385
11
reference_url https://access.redhat.com/errata/RHSA-2022:6386
reference_id RHSA-2022:6386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6386
12
reference_url https://access.redhat.com/errata/RHSA-2022:6551
reference_id RHSA-2022:6551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6551
13
reference_url https://access.redhat.com/errata/RHSA-2022:6850
reference_id RHSA-2022:6850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6850
14
reference_url https://access.redhat.com/errata/RHSA-2022:7268
reference_id RHSA-2022:7268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7268
15
reference_url https://access.redhat.com/errata/RHSA-2022:8263
reference_id RHSA-2022:8263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8263
16
reference_url https://access.redhat.com/errata/RHSA-2023:0166
reference_id RHSA-2023:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0166
17
reference_url https://access.redhat.com/errata/RHSA-2023:0167
reference_id RHSA-2023:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0167
18
reference_url https://access.redhat.com/errata/RHSA-2023:0168
reference_id RHSA-2023:0168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0168
19
reference_url https://access.redhat.com/errata/RHSA-2023:0169
reference_id RHSA-2023:0169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0169
20
reference_url https://access.redhat.com/errata/RHSA-2023:0170
reference_id RHSA-2023:0170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0170
21
reference_url https://access.redhat.com/errata/RHSA-2023:0171
reference_id RHSA-2023:0171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0171
22
reference_url https://access.redhat.com/errata/RHSA-2023:0172
reference_id RHSA-2023:0172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0172
23
reference_url https://usn.ubuntu.com/5608-1/
reference_id USN-5608-1
reference_type
scores
url https://usn.ubuntu.com/5608-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2022-2132
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4swn-75b9-wfa2
2
url VCID-5n3a-tp6w-g3an
vulnerability_id VCID-5n3a-tp6w-g3an
summary dpdk: buffer overflow copying iv_data from guest to host (prepare_sym_cipher_op & prepare_sym_chain_op)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14376.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14376
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24923
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.25002
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.25042
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24815
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24883
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24929
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24944
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24905
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.2485
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24862
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24856
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24833
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14376
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879470
reference_id 1879470
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879470
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
reference_id 971269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
6
reference_url https://usn.ubuntu.com/4550-1/
reference_id USN-4550-1
reference_type
scores
url https://usn.ubuntu.com/4550-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-14376
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5n3a-tp6w-g3an
3
url VCID-9pmw-ntz3-53aa
vulnerability_id VCID-9pmw-ntz3-53aa
summary dpdk: time-of-check time-of-use vulnerabilities throughout vhost_crypto.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14375.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14375
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14879
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14926
published_at 2026-04-02T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.15004
published_at 2026-04-04T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.14808
published_at 2026-04-07T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14898
published_at 2026-04-08T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14948
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14912
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14875
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14815
published_at 2026-04-13T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14712
published_at 2026-04-16T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14719
published_at 2026-04-18T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14779
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14375
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879468
reference_id 1879468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879468
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
reference_id 971269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
6
reference_url https://usn.ubuntu.com/4550-1/
reference_id USN-4550-1
reference_type
scores
url https://usn.ubuntu.com/4550-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-14375
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pmw-ntz3-53aa
4
url VCID-9xpq-nv7z-wyhb
vulnerability_id VCID-9xpq-nv7z-wyhb
summary dpdk: librte_vhost Missing inputs validation in Vhost-crypto
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10724.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10724.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10724
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23738
published_at 2026-04-01T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23855
published_at 2026-04-02T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23895
published_at 2026-04-04T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23685
published_at 2026-04-07T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-08T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23802
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23816
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23772
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23715
published_at 2026-04-13T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23725
published_at 2026-04-16T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23714
published_at 2026-04-18T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23692
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10724
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10724
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10724
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828884
reference_id 1828884
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828884
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
reference_id 960936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
6
reference_url https://access.redhat.com/errata/RHSA-2020:2295
reference_id RHSA-2020:2295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2295
7
reference_url https://access.redhat.com/errata/RHSA-2020:2296
reference_id RHSA-2020:2296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2296
8
reference_url https://access.redhat.com/errata/RHSA-2020:2297
reference_id RHSA-2020:2297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2297
9
reference_url https://access.redhat.com/errata/RHSA-2021:0931
reference_id RHSA-2021:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0931
10
reference_url https://usn.ubuntu.com/4362-1/
reference_id USN-4362-1
reference_type
scores
url https://usn.ubuntu.com/4362-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-10724
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xpq-nv7z-wyhb
5
url VCID-a6u2-jbgk-sqas
vulnerability_id VCID-a6u2-jbgk-sqas
summary dpdk: librte_vhost Malicious guest could cause segfault by sending invalid Virtio descriptor
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10725.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10725
reference_id
reference_type
scores
0
value 0.00606
scoring_system epss
scoring_elements 0.6957
published_at 2026-04-01T12:55:00Z
1
value 0.00606
scoring_system epss
scoring_elements 0.69583
published_at 2026-04-02T12:55:00Z
2
value 0.00606
scoring_system epss
scoring_elements 0.69599
published_at 2026-04-04T12:55:00Z
3
value 0.00606
scoring_system epss
scoring_elements 0.69578
published_at 2026-04-07T12:55:00Z
4
value 0.00606
scoring_system epss
scoring_elements 0.69628
published_at 2026-04-08T12:55:00Z
5
value 0.00606
scoring_system epss
scoring_elements 0.69645
published_at 2026-04-09T12:55:00Z
6
value 0.00606
scoring_system epss
scoring_elements 0.69667
published_at 2026-04-11T12:55:00Z
7
value 0.00606
scoring_system epss
scoring_elements 0.69652
published_at 2026-04-12T12:55:00Z
8
value 0.00606
scoring_system epss
scoring_elements 0.69638
published_at 2026-04-13T12:55:00Z
9
value 0.00606
scoring_system epss
scoring_elements 0.69679
published_at 2026-04-16T12:55:00Z
10
value 0.00606
scoring_system epss
scoring_elements 0.69688
published_at 2026-04-18T12:55:00Z
11
value 0.00606
scoring_system epss
scoring_elements 0.6967
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10725
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828894
reference_id 1828894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828894
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
reference_id 960936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
5
reference_url https://access.redhat.com/errata/RHSA-2020:2295
reference_id RHSA-2020:2295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2295
6
reference_url https://access.redhat.com/errata/RHSA-2020:4806
reference_id RHSA-2020:4806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4806
7
reference_url https://access.redhat.com/errata/RHSA-2021:1239
reference_id RHSA-2021:1239
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1239
8
reference_url https://usn.ubuntu.com/4362-1/
reference_id USN-4362-1
reference_type
scores
url https://usn.ubuntu.com/4362-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-10725
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a6u2-jbgk-sqas
6
url VCID-n7c7-rw39-kucj
vulnerability_id VCID-n7c7-rw39-kucj
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10722.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10722.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10722
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-01T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33561
published_at 2026-04-02T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33594
published_at 2026-04-04T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33433
published_at 2026-04-07T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33477
published_at 2026-04-08T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.3351
published_at 2026-04-09T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33514
published_at 2026-04-11T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-12T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33447
published_at 2026-04-13T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33483
published_at 2026-04-16T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33458
published_at 2026-04-18T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.33425
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10722
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10722
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828867
reference_id 1828867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828867
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
reference_id 960936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
6
reference_url https://access.redhat.com/errata/RHSA-2020:2295
reference_id RHSA-2020:2295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2295
7
reference_url https://access.redhat.com/errata/RHSA-2020:2296
reference_id RHSA-2020:2296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2296
8
reference_url https://access.redhat.com/errata/RHSA-2020:2297
reference_id RHSA-2020:2297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2297
9
reference_url https://access.redhat.com/errata/RHSA-2020:2298
reference_id RHSA-2020:2298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2298
10
reference_url https://access.redhat.com/errata/RHSA-2020:2683
reference_id RHSA-2020:2683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2683
11
reference_url https://access.redhat.com/errata/RHSA-2020:4114
reference_id RHSA-2020:4114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4114
12
reference_url https://access.redhat.com/errata/RHSA-2020:4806
reference_id RHSA-2020:4806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4806
13
reference_url https://access.redhat.com/errata/RHSA-2021:0931
reference_id RHSA-2021:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0931
14
reference_url https://usn.ubuntu.com/4362-1/
reference_id USN-4362-1
reference_type
scores
url https://usn.ubuntu.com/4362-1/
fixed_packages
0
url pkg:deb/debian/dpdk@16.11.11-1%2Bdeb9u2
purl pkg:deb/debian/dpdk@16.11.11-1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35ue-vw4t-sqbg
1
vulnerability VCID-4swn-75b9-wfa2
2
vulnerability VCID-5n3a-tp6w-g3an
3
vulnerability VCID-6q61-guu4-r7d3
4
vulnerability VCID-9pmw-ntz3-53aa
5
vulnerability VCID-9xpq-nv7z-wyhb
6
vulnerability VCID-a6u2-jbgk-sqas
7
vulnerability VCID-n7c7-rw39-kucj
8
vulnerability VCID-r27k-72yv-tfbu
9
vulnerability VCID-s97p-pagr-5fch
10
vulnerability VCID-ugjw-vc2f-1qeb
11
vulnerability VCID-vqxb-ey46-qyem
12
vulnerability VCID-xdnp-mb3d-qqej
13
vulnerability VCID-xhkb-yfwh-vfaw
14
vulnerability VCID-xxh9-badb-ubdb
15
vulnerability VCID-y12m-14rq-nuf1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@16.11.11-1%252Bdeb9u2
1
url pkg:deb/debian/dpdk@18.11.11-1~deb10u1
purl pkg:deb/debian/dpdk@18.11.11-1~deb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-35ue-vw4t-sqbg
1
vulnerability VCID-4swn-75b9-wfa2
2
vulnerability VCID-5n3a-tp6w-g3an
3
vulnerability VCID-9pmw-ntz3-53aa
4
vulnerability VCID-9xpq-nv7z-wyhb
5
vulnerability VCID-a6u2-jbgk-sqas
6
vulnerability VCID-n7c7-rw39-kucj
7
vulnerability VCID-r27k-72yv-tfbu
8
vulnerability VCID-s97p-pagr-5fch
9
vulnerability VCID-ugjw-vc2f-1qeb
10
vulnerability VCID-vqxb-ey46-qyem
11
vulnerability VCID-xdnp-mb3d-qqej
12
vulnerability VCID-xxh9-badb-ubdb
13
vulnerability VCID-y12m-14rq-nuf1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@18.11.11-1~deb10u1
2
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-10722
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7c7-rw39-kucj
7
url VCID-r27k-72yv-tfbu
vulnerability_id VCID-r27k-72yv-tfbu
summary dpdk: write_back_data buffer over read (cipher->para.dst_data_len & desc->len)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14377.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14377
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.1983
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19977
published_at 2026-04-02T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20035
published_at 2026-04-04T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19762
published_at 2026-04-07T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19842
published_at 2026-04-08T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19895
published_at 2026-04-09T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19904
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.1986
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19801
published_at 2026-04-13T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19773
published_at 2026-04-16T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19776
published_at 2026-04-18T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19788
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14377
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879472
reference_id 1879472
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879472
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
reference_id 971269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
6
reference_url https://usn.ubuntu.com/4550-1/
reference_id USN-4550-1
reference_type
scores
url https://usn.ubuntu.com/4550-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-14377
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r27k-72yv-tfbu
8
url VCID-s97p-pagr-5fch
vulnerability_id VCID-s97p-pagr-5fch
summary dpdk: partial Denial of Service due to Integer Underflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14378.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14378
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22495
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22669
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22503
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22582
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22637
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22654
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22557
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22572
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22567
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22516
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879473
reference_id 1879473
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879473
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
reference_id 971269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
6
reference_url https://usn.ubuntu.com/4550-1/
reference_id USN-4550-1
reference_type
scores
url https://usn.ubuntu.com/4550-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-14378
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s97p-pagr-5fch
9
url VCID-ugjw-vc2f-1qeb
vulnerability_id VCID-ugjw-vc2f-1qeb
summary dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28199.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28199
reference_id
reference_type
scores
0
value 0.0083
scoring_system epss
scoring_elements 0.7448
published_at 2026-04-02T12:55:00Z
1
value 0.0083
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-04T12:55:00Z
2
value 0.0083
scoring_system epss
scoring_elements 0.74482
published_at 2026-04-07T12:55:00Z
3
value 0.0083
scoring_system epss
scoring_elements 0.74514
published_at 2026-04-08T12:55:00Z
4
value 0.0083
scoring_system epss
scoring_elements 0.74529
published_at 2026-04-09T12:55:00Z
5
value 0.0083
scoring_system epss
scoring_elements 0.74561
published_at 2026-04-16T12:55:00Z
6
value 0.0083
scoring_system epss
scoring_elements 0.74568
published_at 2026-04-18T12:55:00Z
7
value 0.0083
scoring_system epss
scoring_elements 0.74551
published_at 2026-04-11T12:55:00Z
8
value 0.0083
scoring_system epss
scoring_elements 0.74531
published_at 2026-04-12T12:55:00Z
9
value 0.0083
scoring_system epss
scoring_elements 0.74523
published_at 2026-04-13T12:55:00Z
10
value 0.00976
scoring_system epss
scoring_elements 0.76732
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28199
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019589
reference_id 1019589
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019589
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2123549
reference_id 2123549
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2123549
7
reference_url https://access.redhat.com/errata/RHSA-2022:6502
reference_id RHSA-2022:6502
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6502
8
reference_url https://access.redhat.com/errata/RHSA-2022:6503
reference_id RHSA-2022:6503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6503
9
reference_url https://access.redhat.com/errata/RHSA-2022:6504
reference_id RHSA-2022:6504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6504
10
reference_url https://access.redhat.com/errata/RHSA-2022:6505
reference_id RHSA-2022:6505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6505
11
reference_url https://access.redhat.com/errata/RHSA-2022:6506
reference_id RHSA-2022:6506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6506
12
reference_url https://access.redhat.com/errata/RHSA-2022:8263
reference_id RHSA-2022:8263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8263
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2022-28199
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ugjw-vc2f-1qeb
10
url VCID-vqxb-ey46-qyem
vulnerability_id VCID-vqxb-ey46-qyem
summary dpdk: sending vhost-user-inflight type messages could lead to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0669.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0669.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0669
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29742
published_at 2026-04-01T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29788
published_at 2026-04-02T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29835
published_at 2026-04-04T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36279
published_at 2026-04-16T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36263
published_at 2026-04-18T12:55:00Z
5
value 0.00194
scoring_system epss
scoring_elements 0.41285
published_at 2026-04-21T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43373
published_at 2026-04-08T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43388
published_at 2026-04-09T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43407
published_at 2026-04-11T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43376
published_at 2026-04-12T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43361
published_at 2026-04-13T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43321
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0669
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3839
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0669
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010641
reference_id 1010641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010641
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2055793
reference_id 2055793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2055793
7
reference_url https://security.archlinux.org/AVG-2697
reference_id AVG-2697
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2697
8
reference_url https://access.redhat.com/errata/RHSA-2022:4786
reference_id RHSA-2022:4786
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4786
9
reference_url https://access.redhat.com/errata/RHSA-2022:4787
reference_id RHSA-2022:4787
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4787
10
reference_url https://access.redhat.com/errata/RHSA-2022:4788
reference_id RHSA-2022:4788
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4788
11
reference_url https://usn.ubuntu.com/5401-1/
reference_id USN-5401-1
reference_type
scores
url https://usn.ubuntu.com/5401-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2022-0669
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqxb-ey46-qyem
11
url VCID-xdnp-mb3d-qqej
vulnerability_id VCID-xdnp-mb3d-qqej
summary dpdk: librte_vhost VHOST_USER_GET_INFLIGHT_FD message flooding to result in a DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10726.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10726.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10726
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29687
published_at 2026-04-01T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.2974
published_at 2026-04-02T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29786
published_at 2026-04-04T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29605
published_at 2026-04-07T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29667
published_at 2026-04-08T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29705
published_at 2026-04-09T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29708
published_at 2026-04-11T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29663
published_at 2026-04-12T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29613
published_at 2026-04-13T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29631
published_at 2026-04-16T12:55:00Z
10
value 0.00112
scoring_system epss
scoring_elements 0.29607
published_at 2026-04-18T12:55:00Z
11
value 0.00112
scoring_system epss
scoring_elements 0.29561
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10726
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10726
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10726
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828898
reference_id 1828898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828898
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
reference_id 960936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
5
reference_url https://access.redhat.com/errata/RHSA-2020:2295
reference_id RHSA-2020:2295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2295
6
reference_url https://access.redhat.com/errata/RHSA-2020:4806
reference_id RHSA-2020:4806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4806
7
reference_url https://usn.ubuntu.com/4362-1/
reference_id USN-4362-1
reference_type
scores
url https://usn.ubuntu.com/4362-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-10726
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xdnp-mb3d-qqej
12
url VCID-xxh9-badb-ubdb
vulnerability_id VCID-xxh9-badb-ubdb
summary dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10723.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10723.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10723
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-01T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33561
published_at 2026-04-02T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33594
published_at 2026-04-04T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33433
published_at 2026-04-07T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33477
published_at 2026-04-08T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.3351
published_at 2026-04-09T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33514
published_at 2026-04-11T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-12T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33447
published_at 2026-04-13T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33483
published_at 2026-04-16T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33458
published_at 2026-04-18T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.33425
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10723
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10723
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10723
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1828874
reference_id 1828874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1828874
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
reference_id 960936
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960936
6
reference_url https://access.redhat.com/errata/RHSA-2020:2295
reference_id RHSA-2020:2295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2295
7
reference_url https://access.redhat.com/errata/RHSA-2020:2296
reference_id RHSA-2020:2296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2296
8
reference_url https://access.redhat.com/errata/RHSA-2020:2297
reference_id RHSA-2020:2297
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2297
9
reference_url https://access.redhat.com/errata/RHSA-2020:2298
reference_id RHSA-2020:2298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2298
10
reference_url https://access.redhat.com/errata/RHSA-2020:2683
reference_id RHSA-2020:2683
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2683
11
reference_url https://access.redhat.com/errata/RHSA-2020:4114
reference_id RHSA-2020:4114
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4114
12
reference_url https://access.redhat.com/errata/RHSA-2020:4806
reference_id RHSA-2020:4806
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4806
13
reference_url https://access.redhat.com/errata/RHSA-2021:0931
reference_id RHSA-2021:0931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0931
14
reference_url https://usn.ubuntu.com/4362-1/
reference_id USN-4362-1
reference_type
scores
url https://usn.ubuntu.com/4362-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-10723
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xxh9-badb-ubdb
13
url VCID-y12m-14rq-nuf1
vulnerability_id VCID-y12m-14rq-nuf1
summary dpdk: remote Code Execution in vhost_crypto (VM Escape)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14374.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14374
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36664
published_at 2026-04-01T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36818
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.3685
published_at 2026-04-04T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36687
published_at 2026-04-07T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36737
published_at 2026-04-08T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36754
published_at 2026-04-09T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36763
published_at 2026-04-11T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36728
published_at 2026-04-12T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36702
published_at 2026-04-13T12:55:00Z
9
value 0.00159
scoring_system epss
scoring_elements 0.36747
published_at 2026-04-16T12:55:00Z
10
value 0.00159
scoring_system epss
scoring_elements 0.36729
published_at 2026-04-18T12:55:00Z
11
value 0.00159
scoring_system epss
scoring_elements 0.36669
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14374
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14374
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879466
reference_id 1879466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879466
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
reference_id 971269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971269
6
reference_url https://usn.ubuntu.com/4550-1/
reference_id USN-4550-1
reference_type
scores
url https://usn.ubuntu.com/4550-1/
fixed_packages
0
url pkg:deb/debian/dpdk@20.11.10-1~deb11u1
purl pkg:deb/debian/dpdk@20.11.10-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hf2x-6f8d-c7er
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1
aliases CVE-2020-14374
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y12m-14rq-nuf1
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/dpdk@20.11.10-1~deb11u1