Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-nh9z-sxay-fkdv
SummaryThe Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when DifferentHostFilter or SameHostFilter is enabled, allows remote authenticated users to cause a denial of service (excessive database lookup calls and server hang) via a request with many repeated IDs in the os:scheduler_hints section.
Aliases
0
alias CVE-2012-3371
1
alias GHSA-xxgm-qpj5-4886
2
alias PYSEC-2012-40
Fixed_packages
0
url pkg:deb/debian/nova@2012.1.1-5?distro=trixie
purl pkg:deb/debian/nova@2012.1.1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2012.1.1-5%3Fdistro=trixie
1
url pkg:deb/debian/nova@2:22.0.1-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/nova@2:22.0.1-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hd9e-1msb-uqa6
1
vulnerability VCID-m5vc-4my3-87gk
2
vulnerability VCID-zwuz-pgjz-rkb9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:22.0.1-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/nova@2:26.2.2-1~deb12u3?distro=trixie
purl pkg:deb/debian/nova@2:26.2.2-1~deb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:26.2.2-1~deb12u3%3Fdistro=trixie
3
url pkg:deb/debian/nova@2:31.0.0-6%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/nova@2:31.0.0-6%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:31.0.0-6%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/nova@2:33.0.0~rc1-5?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0~rc1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0~rc1-5%3Fdistro=trixie
5
url pkg:deb/debian/nova@2:33.0.0-1?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-1%3Fdistro=trixie
6
url pkg:deb/debian/nova@2:33.0.0-2?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-2%3Fdistro=trixie
7
url pkg:deb/debian/nova@2:33.0.0-3?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-3%3Fdistro=trixie
8
url pkg:deb/debian/nova@2:33.0.0-4?distro=trixie
purl pkg:deb/debian/nova@2:33.0.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-4%3Fdistro=trixie
Affected_packages
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3371
reference_id
reference_type
scores
0
value 0.00881
scoring_system epss
scoring_elements 0.754
published_at 2026-04-16T12:55:00Z
1
value 0.00881
scoring_system epss
scoring_elements 0.75305
published_at 2026-04-01T12:55:00Z
2
value 0.00881
scoring_system epss
scoring_elements 0.75309
published_at 2026-04-02T12:55:00Z
3
value 0.00881
scoring_system epss
scoring_elements 0.75341
published_at 2026-04-04T12:55:00Z
4
value 0.00881
scoring_system epss
scoring_elements 0.75319
published_at 2026-04-07T12:55:00Z
5
value 0.00881
scoring_system epss
scoring_elements 0.75362
published_at 2026-04-08T12:55:00Z
6
value 0.00881
scoring_system epss
scoring_elements 0.75372
published_at 2026-04-09T12:55:00Z
7
value 0.00881
scoring_system epss
scoring_elements 0.75392
published_at 2026-04-11T12:55:00Z
8
value 0.00881
scoring_system epss
scoring_elements 0.7537
published_at 2026-04-12T12:55:00Z
9
value 0.00881
scoring_system epss
scoring_elements 0.75359
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3371
1
reference_url https://bugs.launchpad.net/nova/+bug/1017795
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/nova/+bug/1017795
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3371
3
reference_url https://github.com/openstack/nova
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/nova
4
reference_url https://github.com/openstack/nova/commit/034762e8060dcf0a11cb039b9d426b0d0bb1801d
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/nova/commit/034762e8060dcf0a11cb039b9d426b0d0bb1801d
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/nova/PYSEC-2012-40.yaml
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/nova/PYSEC-2012-40.yaml
6
reference_url https://lists.launchpad.net/openstack/msg14452.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://lists.launchpad.net/openstack/msg14452.html
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3371
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-3371
8
reference_url http://www.openwall.com/lists/oss-security/2012/07/11/13
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/07/11/13
9
reference_url http://www.securityfocus.com/bid/54388
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54388
10
reference_url http://www.ubuntu.com/usn/USN-1501-1
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1501-1
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681301
reference_id 681301
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681301
12
reference_url https://github.com/advisories/GHSA-xxgm-qpj5-4886
reference_id GHSA-xxgm-qpj5-4886
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xxgm-qpj5-4886
13
reference_url https://usn.ubuntu.com/1501-1/
reference_id USN-1501-1
reference_type
scores
url https://usn.ubuntu.com/1501-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score0.1 - 3
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-nh9z-sxay-fkdv