Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wryy-hpwh-3qgx
SummaryMultiple denial of service vulnerabilites have been found in Open vSwitch.
Aliases
0
alias CVE-2021-3905
Fixed_packages
0
url pkg:alpm/archlinux/openvswitch@2.16.1-1
purl pkg:alpm/archlinux/openvswitch@2.16.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvswitch@2.16.1-1
1
url pkg:deb/debian/openvswitch@0?distro=trixie
purl pkg:deb/debian/openvswitch@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@0%3Fdistro=trixie
2
url pkg:deb/debian/openvswitch@2.15.0%2Bds1-2%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/openvswitch@2.15.0%2Bds1-2%2Bdeb11u5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-y5t4-51s4-zqer
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@2.15.0%252Bds1-2%252Bdeb11u5%3Fdistro=trixie
3
url pkg:deb/debian/openvswitch@3.1.0-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/openvswitch@3.1.0-2%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-y5t4-51s4-zqer
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.1.0-2%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/openvswitch@3.5.0-1?distro=trixie
purl pkg:deb/debian/openvswitch@3.5.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-y5t4-51s4-zqer
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.5.0-1%3Fdistro=trixie
5
url pkg:deb/debian/openvswitch@3.7.1-1?distro=trixie
purl pkg:deb/debian/openvswitch@3.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.7.1-1%3Fdistro=trixie
6
url pkg:deb/debian/openvswitch@3.7.1-2?distro=trixie
purl pkg:deb/debian/openvswitch@3.7.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvswitch@3.7.1-2%3Fdistro=trixie
7
url pkg:ebuild/net-misc/openvswitch@2.17.6
purl pkg:ebuild/net-misc/openvswitch@2.17.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6
Affected_packages
0
url pkg:alpm/archlinux/openvswitch@2.16.0-1
purl pkg:alpm/archlinux/openvswitch@2.16.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wryy-hpwh-3qgx
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvswitch@2.16.0-1
1
url pkg:rpm/redhat/openvswitch2.13@2.13.0-139?arch=el8fdp
purl pkg:rpm/redhat/openvswitch2.13@2.13.0-139?arch=el8fdp
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wryy-hpwh-3qgx
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openvswitch2.13@2.13.0-139%3Farch=el8fdp
2
url pkg:rpm/redhat/openvswitch2.15@2.15.0-55?arch=el8fdp
purl pkg:rpm/redhat/openvswitch2.15@2.15.0-55?arch=el8fdp
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wryy-hpwh-3qgx
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openvswitch2.15@2.15.0-55%3Farch=el8fdp
3
url pkg:rpm/redhat/openvswitch2.16@2.16.0-86?arch=el8fdp
purl pkg:rpm/redhat/openvswitch2.16@2.16.0-86?arch=el8fdp
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wryy-hpwh-3qgx
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openvswitch2.16@2.16.0-86%3Farch=el8fdp
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3905.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3905.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3905
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37635
published_at 2026-04-01T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37467
published_at 2026-04-24T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37765
published_at 2026-04-18T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37705
published_at 2026-04-21T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37817
published_at 2026-04-02T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37842
published_at 2026-04-04T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.3772
published_at 2026-04-07T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.3777
published_at 2026-04-08T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37783
published_at 2026-04-09T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37798
published_at 2026-04-11T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37762
published_at 2026-04-12T12:55:00Z
11
value 0.00166
scoring_system epss
scoring_elements 0.37737
published_at 2026-04-13T12:55:00Z
12
value 0.00166
scoring_system epss
scoring_elements 0.37785
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3905
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2019692
reference_id 2019692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2019692
4
reference_url https://security.archlinux.org/AVG-2516
reference_id AVG-2516
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2516
5
reference_url https://security.gentoo.org/glsa/202311-16
reference_id GLSA-202311-16
reference_type
scores
url https://security.gentoo.org/glsa/202311-16
6
reference_url https://usn.ubuntu.com/5242-1/
reference_id USN-5242-1
reference_type
scores
url https://usn.ubuntu.com/5242-1/
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Exploits
Severity_range_score4.0 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wryy-hpwh-3qgx