Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/neutron@2:17.1.1-5?distro=trixie
Typedeb
Namespacedebian
Nameneutron
Version2:17.1.1-5
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2:18.1.0-2
Latest_non_vulnerable_version2:28.0.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-sh88-99pv-aqac
vulnerability_id VCID-sh88-99pv-aqac
summary A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20267.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20267.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20267
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31127
published_at 2026-04-29T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31206
published_at 2026-04-26T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31333
published_at 2026-04-24T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31658
published_at 2026-04-02T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31573
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.3152
published_at 2026-04-07T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31521
published_at 2026-04-01T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31702
published_at 2026-04-04T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31507
published_at 2026-04-21T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.3154
published_at 2026-04-18T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31562
published_at 2026-04-16T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31528
published_at 2026-04-13T12:55:00Z
12
value 0.00123
scoring_system epss
scoring_elements 0.31565
published_at 2026-04-12T12:55:00Z
13
value 0.00123
scoring_system epss
scoring_elements 0.31608
published_at 2026-04-11T12:55:00Z
14
value 0.00123
scoring_system epss
scoring_elements 0.31603
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20267
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1934330
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1934330
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20267
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20267
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/openstack/neutron
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/neutron
6
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/neutron/PYSEC-2021-136.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/neutron/PYSEC-2021-136.yaml
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-20267
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-20267
8
reference_url https://security.openstack.org/ossa/OSSA-2021-001.html
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.openstack.org/ossa/OSSA-2021-001.html
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985104
reference_id 985104
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985104
10
reference_url https://github.com/advisories/GHSA-w8hx-f868-pvch
reference_id GHSA-w8hx-f868-pvch
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w8hx-f868-pvch
11
reference_url https://usn.ubuntu.com/6067-1/
reference_id USN-6067-1
reference_type
scores
url https://usn.ubuntu.com/6067-1/
fixed_packages
0
url pkg:deb/debian/neutron@2:17.1.1-5?distro=trixie
purl pkg:deb/debian/neutron@2:17.1.1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.1.1-5%3Fdistro=trixie
1
url pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/neutron@2:17.2.1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qua4-h1r7-a7b7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.2.1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
purl pkg:deb/debian/neutron@2:21.0.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:21.0.0-7%3Fdistro=trixie
3
url pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
purl pkg:deb/debian/neutron@2:26.0.0-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:26.0.0-9%3Fdistro=trixie
4
url pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
purl pkg:deb/debian/neutron@2:27.0.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:27.0.1-6%3Fdistro=trixie
5
url pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
purl pkg:deb/debian/neutron@2:28.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:28.0.0-1%3Fdistro=trixie
aliases CVE-2021-20267, GHSA-w8hx-f868-pvch, PYSEC-2021-136
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh88-99pv-aqac
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/neutron@2:17.1.1-5%3Fdistro=trixie