Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-3thq-dnhj-t7d5
Summarypython-eventlet: patch regression for CVE-2021-21419 in some Red Hat builds
Aliases
0
alias CVE-2023-5625
Fixed_packages
0
url pkg:deb/debian/python-eventlet@0?distro=trixie
purl pkg:deb/debian/python-eventlet@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-eventlet@0%3Fdistro=trixie
1
url pkg:deb/debian/python-eventlet@0.26.1-7%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/python-eventlet@0.26.1-7%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-eventlet@0.26.1-7%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/python-eventlet@0.33.1-4?distro=trixie
purl pkg:deb/debian/python-eventlet@0.33.1-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-bnye-3p23-zyc9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-eventlet@0.33.1-4%3Fdistro=trixie
3
url pkg:deb/debian/python-eventlet@0.39.1-2%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/python-eventlet@0.39.1-2%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-eventlet@0.39.1-2%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/python-eventlet@0.40.4-1?distro=trixie
purl pkg:deb/debian/python-eventlet@0.40.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-eventlet@0.40.4-1%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/python-eventlet@0.30.2-4?arch=el8ost
purl pkg:rpm/redhat/python-eventlet@0.30.2-4?arch=el8ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3thq-dnhj-t7d5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-eventlet@0.30.2-4%3Farch=el8ost
1
url pkg:rpm/redhat/python-eventlet@0.30.2-4?arch=el9ost
purl pkg:rpm/redhat/python-eventlet@0.30.2-4?arch=el9ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3thq-dnhj-t7d5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-eventlet@0.30.2-4%3Farch=el9ost
2
url pkg:rpm/redhat/python-eventlet@0.30.2-4?arch=el9
purl pkg:rpm/redhat/python-eventlet@0.30.2-4?arch=el9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3thq-dnhj-t7d5
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-eventlet@0.30.2-4%3Farch=el9
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5625.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5625
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.27993
published_at 2026-04-21T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28192
published_at 2026-04-02T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28047
published_at 2026-04-13T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28057
published_at 2026-04-16T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.2804
published_at 2026-04-18T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28236
published_at 2026-04-04T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.2803
published_at 2026-04-07T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28097
published_at 2026-04-08T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28141
published_at 2026-04-09T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28147
published_at 2026-04-11T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.28103
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5625
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244717
reference_id 2244717
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:10:57Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2244717
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
reference_id cpe:/a:redhat:openshift:4.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_ironic:4.12::el9
reference_id cpe:/a:redhat:openshift_ironic:4.12::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_ironic:4.12::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el8
reference_id cpe:/a:redhat:openstack:17.1::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el9
reference_id cpe:/a:redhat:openstack:17.1::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openstack:17.1::el9
9
reference_url https://access.redhat.com/security/cve/CVE-2023-5625
reference_id CVE-2023-5625
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:10:57Z/
url https://access.redhat.com/security/cve/CVE-2023-5625
10
reference_url https://access.redhat.com/errata/RHSA-2023:6128
reference_id RHSA-2023:6128
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:10:57Z/
url https://access.redhat.com/errata/RHSA-2023:6128
11
reference_url https://access.redhat.com/errata/RHSA-2024:0188
reference_id RHSA-2024:0188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:10:57Z/
url https://access.redhat.com/errata/RHSA-2024:0188
12
reference_url https://access.redhat.com/errata/RHSA-2024:0213
reference_id RHSA-2024:0213
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-31T20:10:57Z/
url https://access.redhat.com/errata/RHSA-2024:0213
Weaknesses
0
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Exploits
Severity_range_score5.3 - 5.3
Exploitability0.5
Weighted_severity4.8
Risk_score2.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-3thq-dnhj-t7d5