Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-1qbm-qguj-gkem
Summary
OpenStack Nova Filter Scheduler Bypass
In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3.
Aliases
0
alias CVE-2017-16239
1
alias GHSA-w2wf-cgwh-vpqg
Fixed_packages
0
url pkg:deb/debian/nova@2:14.0.0-4%2Bdeb9u1
purl pkg:deb/debian/nova@2:14.0.0-4%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1fb2-ccby-7yfq
1
vulnerability VCID-1qbm-qguj-gkem
2
vulnerability VCID-2dpk-ncrc-1fcw
3
vulnerability VCID-br4q-499g-vqhg
4
vulnerability VCID-cwub-w9dp-wfgy
5
vulnerability VCID-cy7p-gzf8-eqcj
6
vulnerability VCID-h6rd-5p7q-s3gq
7
vulnerability VCID-qfdm-g857-3yb5
8
vulnerability VCID-s69v-tc7x-37fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:14.0.0-4%252Bdeb9u1
1
url pkg:deb/debian/nova@2:16.0.3-1?distro=trixie
purl pkg:deb/debian/nova@2:16.0.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:16.0.3-1%3Fdistro=trixie
2
url pkg:deb/debian/nova@2:18.1.0-6
purl pkg:deb/debian/nova@2:18.1.0-6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1fb2-ccby-7yfq
1
vulnerability VCID-2dpk-ncrc-1fcw
2
vulnerability VCID-br4q-499g-vqhg
3
vulnerability VCID-h6rd-5p7q-s3gq
4
vulnerability VCID-qfdm-g857-3yb5
5
vulnerability VCID-s69v-tc7x-37fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:18.1.0-6
3
url pkg:deb/debian/nova@2:22.0.1-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/nova@2:22.0.1-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hd9e-1msb-uqa6
1
vulnerability VCID-m5vc-4my3-87gk
2
vulnerability VCID-zwuz-pgjz-rkb9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:22.0.1-2%252Bdeb11u1%3Fdistro=trixie
4
url pkg:deb/debian/nova@2:26.2.2-1~deb12u3?distro=trixie
purl pkg:deb/debian/nova@2:26.2.2-1~deb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:26.2.2-1~deb12u3%3Fdistro=trixie
5
url pkg:deb/debian/nova@2:31.0.0-6%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/nova@2:31.0.0-6%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:31.0.0-6%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/nova@2:33.0.0~rc1-5?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0~rc1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0~rc1-5%3Fdistro=trixie
7
url pkg:deb/debian/nova@2:33.0.0-1?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-1%3Fdistro=trixie
8
url pkg:deb/debian/nova@2:33.0.0-2?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-2%3Fdistro=trixie
9
url pkg:deb/debian/nova@2:33.0.0-3?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-3%3Fdistro=trixie
10
url pkg:deb/debian/nova@2:33.0.0-4?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-4%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/nova@2012.1.1-18
purl pkg:deb/debian/nova@2012.1.1-18
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1fb2-ccby-7yfq
1
vulnerability VCID-1p1c-fevy-bydg
2
vulnerability VCID-1qbm-qguj-gkem
3
vulnerability VCID-2dpk-ncrc-1fcw
4
vulnerability VCID-5nfz-1bk3-93fe
5
vulnerability VCID-5w9q-vw2n-zfdu
6
vulnerability VCID-6n3z-x4zj-4bez
7
vulnerability VCID-7wvt-bvww-g7ck
8
vulnerability VCID-7yp4-ebnm-g3c3
9
vulnerability VCID-9se5-m6dx-8kcj
10
vulnerability VCID-az4e-wgmd-gyc3
11
vulnerability VCID-bauj-n7jg-gkd2
12
vulnerability VCID-br4q-499g-vqhg
13
vulnerability VCID-cwub-w9dp-wfgy
14
vulnerability VCID-cy7p-gzf8-eqcj
15
vulnerability VCID-ek6e-977t-3bew
16
vulnerability VCID-ex1j-py3q-93hv
17
vulnerability VCID-h6rd-5p7q-s3gq
18
vulnerability VCID-hcsa-vfvp-buax
19
vulnerability VCID-hgk8-jtvw-9fgb
20
vulnerability VCID-jdb7-71q5-pfcx
21
vulnerability VCID-jdn1-d4d3-sud7
22
vulnerability VCID-k48d-ecqx-m3ed
23
vulnerability VCID-kncr-vrmh-fygm
24
vulnerability VCID-kqbu-drg3-fycm
25
vulnerability VCID-n6d6-1kyd-qufe
26
vulnerability VCID-nb1y-cbzs-abhc
27
vulnerability VCID-q246-vzd6-3qfb
28
vulnerability VCID-qb9p-rpza-5fa5
29
vulnerability VCID-qe1w-wnfu-mudr
30
vulnerability VCID-qfdm-g857-3yb5
31
vulnerability VCID-qnhs-qv3p-myg2
32
vulnerability VCID-r558-z5xb-v3a8
33
vulnerability VCID-rvp9-etcr-wycj
34
vulnerability VCID-s69v-tc7x-37fe
35
vulnerability VCID-sj2k-uq1g-suby
36
vulnerability VCID-t2sh-b3m5-vyax
37
vulnerability VCID-v47b-k4qx-h7a2
38
vulnerability VCID-vena-h39k-v3fe
39
vulnerability VCID-x5k4-dm9d-xkf7
40
vulnerability VCID-y8va-eyt2-3kfv
41
vulnerability VCID-ykzj-fz7y-eug8
42
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2012.1.1-18
1
url pkg:deb/debian/nova@2014.1.3-11
purl pkg:deb/debian/nova@2014.1.3-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1fb2-ccby-7yfq
1
vulnerability VCID-1qbm-qguj-gkem
2
vulnerability VCID-2dpk-ncrc-1fcw
3
vulnerability VCID-5nfz-1bk3-93fe
4
vulnerability VCID-6n3z-x4zj-4bez
5
vulnerability VCID-7yp4-ebnm-g3c3
6
vulnerability VCID-9se5-m6dx-8kcj
7
vulnerability VCID-br4q-499g-vqhg
8
vulnerability VCID-cwub-w9dp-wfgy
9
vulnerability VCID-cy7p-gzf8-eqcj
10
vulnerability VCID-ek6e-977t-3bew
11
vulnerability VCID-h6rd-5p7q-s3gq
12
vulnerability VCID-jdb7-71q5-pfcx
13
vulnerability VCID-k48d-ecqx-m3ed
14
vulnerability VCID-nb1y-cbzs-abhc
15
vulnerability VCID-qfdm-g857-3yb5
16
vulnerability VCID-s69v-tc7x-37fe
17
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11
2
url pkg:deb/debian/nova@2:13.1.0-2~bpo8%2B1
purl pkg:deb/debian/nova@2:13.1.0-2~bpo8%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1fb2-ccby-7yfq
1
vulnerability VCID-1qbm-qguj-gkem
2
vulnerability VCID-2dpk-ncrc-1fcw
3
vulnerability VCID-br4q-499g-vqhg
4
vulnerability VCID-cwub-w9dp-wfgy
5
vulnerability VCID-cy7p-gzf8-eqcj
6
vulnerability VCID-h6rd-5p7q-s3gq
7
vulnerability VCID-jdb7-71q5-pfcx
8
vulnerability VCID-qfdm-g857-3yb5
9
vulnerability VCID-s69v-tc7x-37fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:13.1.0-2~bpo8%252B1
3
url pkg:deb/debian/nova@2:14.0.0-4%2Bdeb9u1
purl pkg:deb/debian/nova@2:14.0.0-4%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1fb2-ccby-7yfq
1
vulnerability VCID-1qbm-qguj-gkem
2
vulnerability VCID-2dpk-ncrc-1fcw
3
vulnerability VCID-br4q-499g-vqhg
4
vulnerability VCID-cwub-w9dp-wfgy
5
vulnerability VCID-cy7p-gzf8-eqcj
6
vulnerability VCID-h6rd-5p7q-s3gq
7
vulnerability VCID-qfdm-g857-3yb5
8
vulnerability VCID-s69v-tc7x-37fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:14.0.0-4%252Bdeb9u1
4
url pkg:pypi/nova@14.0.0
purl pkg:pypi/nova@14.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qbm-qguj-gkem
1
vulnerability VCID-jdb7-71q5-pfcx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/nova@14.0.0
5
url pkg:pypi/nova@15.0.0
purl pkg:pypi/nova@15.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qbm-qguj-gkem
1
vulnerability VCID-cy7p-gzf8-eqcj
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/nova@15.0.0
6
url pkg:pypi/nova@16.0.0
purl pkg:pypi/nova@16.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qbm-qguj-gkem
1
vulnerability VCID-cy7p-gzf8-eqcj
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/nova@16.0.0
7
url pkg:rpm/redhat/openstack-nova@1:14.1.0-3?arch=el7ost
purl pkg:rpm/redhat/openstack-nova@1:14.1.0-3?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qbm-qguj-gkem
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@1:14.1.0-3%3Farch=el7ost
8
url pkg:rpm/redhat/openstack-nova@1:15.0.8-5?arch=el7ost
purl pkg:rpm/redhat/openstack-nova@1:15.0.8-5?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qbm-qguj-gkem
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@1:15.0.8-5%3Farch=el7ost
9
url pkg:rpm/redhat/openstack-nova@1:16.0.2-9?arch=el7ost
purl pkg:rpm/redhat/openstack-nova@1:16.0.2-9?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qbm-qguj-gkem
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@1:16.0.2-9%3Farch=el7ost
10
url pkg:rpm/redhat/python-novaclient@1:6.0.2-2?arch=el7ost
purl pkg:rpm/redhat/python-novaclient@1:6.0.2-2?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1qbm-qguj-gkem
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-novaclient@1:6.0.2-2%3Farch=el7ost
References
0
reference_url https://access.redhat.com/errata/RHSA-2018:0241
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0241
1
reference_url https://access.redhat.com/errata/RHSA-2018:0314
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0314
2
reference_url https://access.redhat.com/errata/RHSA-2018:0369
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:0369
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16239.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16239.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16239
reference_id
reference_type
scores
0
value 0.00385
scoring_system epss
scoring_elements 0.59775
published_at 2026-04-09T12:55:00Z
1
value 0.00385
scoring_system epss
scoring_elements 0.59761
published_at 2026-04-13T12:55:00Z
2
value 0.00385
scoring_system epss
scoring_elements 0.5971
published_at 2026-04-07T12:55:00Z
3
value 0.00385
scoring_system epss
scoring_elements 0.5974
published_at 2026-04-04T12:55:00Z
4
value 0.00385
scoring_system epss
scoring_elements 0.59794
published_at 2026-04-11T12:55:00Z
5
value 0.00385
scoring_system epss
scoring_elements 0.59779
published_at 2026-04-12T12:55:00Z
6
value 0.00385
scoring_system epss
scoring_elements 0.59798
published_at 2026-04-16T12:55:00Z
7
value 0.00385
scoring_system epss
scoring_elements 0.59715
published_at 2026-04-02T12:55:00Z
8
value 0.00385
scoring_system epss
scoring_elements 0.59642
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16239
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16239
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:P
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/openstack/nova
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/nova
8
reference_url https://github.com/openstack/nova/commit/698b261a5a2a6c0f31ef5059046ef7196d5cba30
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/nova/commit/698b261a5a2a6c0f31ef5059046ef7196d5cba30
9
reference_url https://github.com/openstack/nova/commit/984dd8ad6add4523d93c7ce5a666a32233e02e34
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/nova/commit/984dd8ad6add4523d93c7ce5a666a32233e02e34
10
reference_url https://github.com/openstack/nova/commit/9e2d63da94db63d97bd02e373bfc53d95808b833
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/nova/commit/9e2d63da94db63d97bd02e373bfc53d95808b833
11
reference_url https://github.com/openstack/nova/commit/b72105c1c49fcddc94992af63fc2f8078023491a
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/nova/commit/b72105c1c49fcddc94992af63fc2f8078023491a
12
reference_url https://launchpad.net/bugs/1664931
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://launchpad.net/bugs/1664931
13
reference_url https://security.openstack.org/ossa/OSSA-2017-005.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.openstack.org/ossa/OSSA-2017-005.html
14
reference_url https://www.debian.org/security/2017/dsa-4056
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2017/dsa-4056
15
reference_url http://www.securityfocus.com/bid/101950
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/101950
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1508539
reference_id 1508539
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1508539
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882009
reference_id 882009
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882009
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:15.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:15.0.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:16.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:16.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:16.0.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:16.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:16.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:16.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:16.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:nova:16.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:16.0.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16239
reference_id CVE-2017-16239
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-16239
31
reference_url https://github.com/advisories/GHSA-w2wf-cgwh-vpqg
reference_id GHSA-w2wf-cgwh-vpqg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-w2wf-cgwh-vpqg
Weaknesses
0
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
1
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
2
cwe_id 841
name Improper Enforcement of Behavioral Workflow
description The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.
Exploits
Severity_range_score3.6 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-1qbm-qguj-gkem