Search for packages
| purl | pkg:pypi/neutron@20.0.0.0rc2 |
| Next non-vulnerable version | 23.0.0.0b1 |
| Latest non-vulnerable version | 26.0.0.0b1 |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-9urm-66y7-s3hs
Aliases: CVE-2014-3555 GHSA-4pmp-38hf-rmwj |
OpenStack Neutron allows remote authenticated users to cause a denial of service OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (crash or long firewall rule updates) by creating a large number of allowed address pairs. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-qua4-h1r7-a7b7
Aliases: CVE-2022-3277 GHSA-w446-h7vg-wv3p |
openstack-neutron uncontrolled resource consumption flaw An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
|
VCID-uf52-su2e-y3ck
Aliases: CVE-2015-3221 GHSA-wf44-4mgj-rwvx |
Improper Input Validation A Denial-of-Service flaw was found in the OpenStack Networking (neutron) L2 agent when using the iptables firewall driver. By submitting an address pair that is rejected as invalid by the ipset tool (with zero prefix size), an authenticated attacker can cause the L2 agent to crash. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-ydug-1dq5-aya1
Aliases: CVE-2023-3637 GHSA-r3jh-qhgj-gvr8 |
Uncontrolled Resource Consumption An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||