Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/neutron@0?distro=trixie
Typedeb
Namespacedebian
Nameneutron
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2013.2.1-1
Latest_non_vulnerable_version2:28.0.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-26nq-rncj-qbbv
vulnerability_id VCID-26nq-rncj-qbbv
summary openstack-neutron: regression of fix for CVE-2013-6433
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-1339.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1339.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3632.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3632.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3632
reference_id
reference_type
scores
0
value 0.01213
scoring_system epss
scoring_elements 0.79027
published_at 2026-04-21T12:55:00Z
1
value 0.01213
scoring_system epss
scoring_elements 0.78956
published_at 2026-04-01T12:55:00Z
2
value 0.01213
scoring_system epss
scoring_elements 0.78962
published_at 2026-04-02T12:55:00Z
3
value 0.01213
scoring_system epss
scoring_elements 0.78989
published_at 2026-04-04T12:55:00Z
4
value 0.01213
scoring_system epss
scoring_elements 0.78974
published_at 2026-04-07T12:55:00Z
5
value 0.01213
scoring_system epss
scoring_elements 0.78998
published_at 2026-04-08T12:55:00Z
6
value 0.01213
scoring_system epss
scoring_elements 0.79004
published_at 2026-04-09T12:55:00Z
7
value 0.01213
scoring_system epss
scoring_elements 0.79028
published_at 2026-04-18T12:55:00Z
8
value 0.01213
scoring_system epss
scoring_elements 0.79013
published_at 2026-04-12T12:55:00Z
9
value 0.01213
scoring_system epss
scoring_elements 0.79003
published_at 2026-04-13T12:55:00Z
10
value 0.01213
scoring_system epss
scoring_elements 0.79031
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3632
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1140949
reference_id 1140949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1140949
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3632
reference_id CVE-2014-3632
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-3632
6
reference_url https://access.redhat.com/errata/RHSA-2014:1339
reference_id RHSA-2014:1339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1339
fixed_packages
0
url pkg:deb/debian/neutron@0?distro=trixie
purl pkg:deb/debian/neutron@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@0%3Fdistro=trixie
1
url pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qua4-h1r7-a7b7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.2.1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
purl pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:21.0.0-7%3Fdistro=trixie
3
url pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
purl pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:26.0.0-9%3Fdistro=trixie
4
url pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
purl pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:27.0.1-6%3Fdistro=trixie
5
url pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
purl pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:28.0.0-1%3Fdistro=trixie
aliases CVE-2014-3632
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26nq-rncj-qbbv
1
url VCID-d7zk-1d89-dbbw
vulnerability_id VCID-d7zk-1d89-dbbw
summary
OpenStack Neutron can use an incorrect ID during policy enforcement
In OpenStack Neutron before 25.0.1, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. It does not apply the proper policy check for changing network tags. An unprivileged tenant is able to change (add and clear) tags on network objects that do not belong to the tenant, and this action is not subjected to the proper policy authorization check. This affects 23 before 23.2.1, 24 before 24.0.2, and 25 before 25.0.1.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53916.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-53916
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33868
published_at 2026-04-21T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.339
published_at 2026-04-18T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33877
published_at 2026-04-13T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33915
published_at 2026-04-16T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33901
published_at 2026-04-12T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33943
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33944
published_at 2026-04-09T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33913
published_at 2026-04-08T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33871
published_at 2026-04-07T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.34016
published_at 2026-04-04T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33985
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-53916
2
reference_url https://github.com/openstack/neutron
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/neutron
3
reference_url https://github.com/openstack/neutron/blob/363ffa6e9e1ab5968f87d45bc2f1cb6394f48b9f/neutron/extensions/tagging.py#L138-L232
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:11Z/
url https://github.com/openstack/neutron/blob/363ffa6e9e1ab5968f87d45bc2f1cb6394f48b9f/neutron/extensions/tagging.py#L138-L232
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-53916
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-53916
5
reference_url https://review.opendev.org/c/openstack/neutron/+/935883
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:11Z/
url https://review.opendev.org/c/openstack/neutron/+/935883
6
reference_url https://review.opendev.org/q/project:openstack/neutron
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:11Z/
url https://review.opendev.org/q/project:openstack/neutron
7
reference_url https://security.openstack.org/ossa/OSSA-2024-005.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:11Z/
url https://security.openstack.org/ossa/OSSA-2024-005.html
8
reference_url http://www.openwall.com/lists/oss-security/2024/12/03/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/12/03/1
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088802
reference_id 1088802
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088802
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2328595
reference_id 2328595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2328595
11
reference_url https://github.com/advisories/GHSA-f27h-g923-68hw
reference_id GHSA-f27h-g923-68hw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f27h-g923-68hw
fixed_packages
0
url pkg:deb/debian/neutron@0?distro=trixie
purl pkg:deb/debian/neutron@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@0%3Fdistro=trixie
1
url pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qua4-h1r7-a7b7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.2.1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
purl pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:21.0.0-7%3Fdistro=trixie
3
url pkg:deb/debian/neutron@2:25.0.0-2?distro=trixie
purl pkg:deb/debian/neutron@2:25.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:25.0.0-2%3Fdistro=trixie
4
url pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
purl pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:26.0.0-9%3Fdistro=trixie
5
url pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
purl pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:27.0.1-6%3Fdistro=trixie
6
url pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
purl pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:28.0.0-1%3Fdistro=trixie
aliases CVE-2024-53916, GHSA-f27h-g923-68hw
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d7zk-1d89-dbbw
2
url VCID-s58r-txyg-g3aw
vulnerability_id VCID-s58r-txyg-g3aw
summary
Concurrent Execution using Shared Resource with Improper Synchronization (Race Condition)
A race-condition flaw was discovered in openstack-neutron: following a minor overcloud update, neutron security groups were disabled.
references
0
reference_url https://access.redhat.com/errata/RHSA-2017:2447
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2447
1
reference_url https://access.redhat.com/errata/RHSA-2017:2448
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2448
2
reference_url https://access.redhat.com/errata/RHSA-2017:2449
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2449
3
reference_url https://access.redhat.com/errata/RHSA-2017:2450
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2450
4
reference_url https://access.redhat.com/errata/RHSA-2017:2451
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2451
5
reference_url https://access.redhat.com/errata/RHSA-2017:2452
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2452
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7543.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7543.json
7
reference_url https://access.redhat.com/security/cve/CVE-2017-7543
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2017-7543
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7543
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63901
published_at 2026-04-04T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63938
published_at 2026-04-18T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63813
published_at 2026-04-01T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63859
published_at 2026-04-07T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63874
published_at 2026-04-02T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63928
published_at 2026-04-21T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63892
published_at 2026-04-13T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63925
published_at 2026-04-12T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63939
published_at 2026-04-11T12:55:00Z
9
value 0.00456
scoring_system epss
scoring_elements 0.63926
published_at 2026-04-09T12:55:00Z
10
value 0.00456
scoring_system epss
scoring_elements 0.63909
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7543
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1473792
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1473792
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7543
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7543
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
1
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://opendev.org/openstack/neutron
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/neutron
13
reference_url https://web.archive.org/web/20200227153412/https://www.securityfocus.com/bid/100237
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200227153412/https://www.securityfocus.com/bid/100237
14
reference_url http://www.securityfocus.com/bid/100237
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100237
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7543
reference_id CVE-2017-7543
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-7543
16
reference_url https://github.com/advisories/GHSA-hvxr-2fvv-c3wq
reference_id GHSA-hvxr-2fvv-c3wq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hvxr-2fvv-c3wq
fixed_packages
0
url pkg:deb/debian/neutron@0?distro=trixie
purl pkg:deb/debian/neutron@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@0%3Fdistro=trixie
1
url pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qua4-h1r7-a7b7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.2.1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
purl pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:21.0.0-7%3Fdistro=trixie
3
url pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
purl pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:26.0.0-9%3Fdistro=trixie
4
url pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
purl pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:27.0.1-6%3Fdistro=trixie
5
url pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
purl pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:28.0.0-1%3Fdistro=trixie
aliases CVE-2017-7543, GHSA-hvxr-2fvv-c3wq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s58r-txyg-g3aw
3
url VCID-tmfc-jgc1-ykat
vulnerability_id VCID-tmfc-jgc1-ykat
summary openstack-neutron: L3 agent denial of service with radvd 2.0+ (OSSA 2015-001)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8153.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8153
reference_id
reference_type
scores
0
value 0.00709
scoring_system epss
scoring_elements 0.72157
published_at 2026-04-01T12:55:00Z
1
value 0.00709
scoring_system epss
scoring_elements 0.72162
published_at 2026-04-02T12:55:00Z
2
value 0.00709
scoring_system epss
scoring_elements 0.72182
published_at 2026-04-04T12:55:00Z
3
value 0.00709
scoring_system epss
scoring_elements 0.7216
published_at 2026-04-07T12:55:00Z
4
value 0.00709
scoring_system epss
scoring_elements 0.72197
published_at 2026-04-08T12:55:00Z
5
value 0.00709
scoring_system epss
scoring_elements 0.72209
published_at 2026-04-09T12:55:00Z
6
value 0.00709
scoring_system epss
scoring_elements 0.72232
published_at 2026-04-11T12:55:00Z
7
value 0.00709
scoring_system epss
scoring_elements 0.72216
published_at 2026-04-12T12:55:00Z
8
value 0.00709
scoring_system epss
scoring_elements 0.72202
published_at 2026-04-13T12:55:00Z
9
value 0.00709
scoring_system epss
scoring_elements 0.72245
published_at 2026-04-16T12:55:00Z
10
value 0.00709
scoring_system epss
scoring_elements 0.72255
published_at 2026-04-18T12:55:00Z
11
value 0.00709
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8153
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1180469
reference_id 1180469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1180469
fixed_packages
0
url pkg:deb/debian/neutron@0?distro=trixie
purl pkg:deb/debian/neutron@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@0%3Fdistro=trixie
1
url pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qua4-h1r7-a7b7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.2.1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
purl pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:21.0.0-7%3Fdistro=trixie
3
url pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
purl pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:26.0.0-9%3Fdistro=trixie
4
url pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
purl pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:27.0.1-6%3Fdistro=trixie
5
url pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
purl pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:28.0.0-1%3Fdistro=trixie
aliases CVE-2014-8153
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmfc-jgc1-ykat
4
url VCID-ydug-1dq5-aya1
vulnerability_id VCID-ydug-1dq5-aya1
summary
Uncontrolled Resource Consumption
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
references
0
reference_url https://access.redhat.com/errata/RHSA-2023:4283
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:48:25Z/
url https://access.redhat.com/errata/RHSA-2023:4283
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3637.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3637.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3637
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.38016
published_at 2026-04-21T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38038
published_at 2026-04-07T12:55:00Z
2
value 0.00169
scoring_system epss
scoring_elements 0.38089
published_at 2026-04-08T12:55:00Z
3
value 0.00169
scoring_system epss
scoring_elements 0.38097
published_at 2026-04-09T12:55:00Z
4
value 0.00169
scoring_system epss
scoring_elements 0.38115
published_at 2026-04-11T12:55:00Z
5
value 0.00169
scoring_system epss
scoring_elements 0.38078
published_at 2026-04-12T12:55:00Z
6
value 0.00169
scoring_system epss
scoring_elements 0.38054
published_at 2026-04-13T12:55:00Z
7
value 0.00169
scoring_system epss
scoring_elements 0.38099
published_at 2026-04-16T12:55:00Z
8
value 0.00169
scoring_system epss
scoring_elements 0.38079
published_at 2026-04-18T12:55:00Z
9
value 0.00169
scoring_system epss
scoring_elements 0.38145
published_at 2026-04-02T12:55:00Z
10
value 0.00169
scoring_system epss
scoring_elements 0.38168
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3637
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2222270
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:48:25Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2222270
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.1
reference_id cpe:/a:redhat:openstack:16.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.1
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2::el8
reference_id cpe:/a:redhat:openstack:16.2::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:16.2::el8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.0
reference_id cpe:/a:redhat:openstack:17.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.0
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1
reference_id cpe:/a:redhat:openstack:17.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:18.0
reference_id cpe:/a:redhat:openstack:18.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:18.0
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack-optools:13
reference_id cpe:/a:redhat:openstack-optools:13
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack-optools:13
11
reference_url https://access.redhat.com/security/cve/CVE-2023-3637
reference_id CVE-2023-3637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:48:25Z/
url https://access.redhat.com/security/cve/CVE-2023-3637
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-3637
reference_id CVE-2023-3637
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-3637
13
reference_url https://github.com/advisories/GHSA-r3jh-qhgj-gvr8
reference_id GHSA-r3jh-qhgj-gvr8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r3jh-qhgj-gvr8
fixed_packages
0
url pkg:deb/debian/neutron@0?distro=trixie
purl pkg:deb/debian/neutron@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@0%3Fdistro=trixie
1
url pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qua4-h1r7-a7b7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.2.1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
purl pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:21.0.0-7%3Fdistro=trixie
3
url pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
purl pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:26.0.0-9%3Fdistro=trixie
4
url pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
purl pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:27.0.1-6%3Fdistro=trixie
5
url pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
purl pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:28.0.0-1%3Fdistro=trixie
aliases CVE-2023-3637, GHSA-r3jh-qhgj-gvr8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydug-1dq5-aya1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@0%3Fdistro=trixie