Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85528?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "type": "ebuild", "namespace": "net-misc", "name": "openvswitch", "version": "2.17.6", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61171?format=api", "vulnerability_id": "VCID-buc7-dne2-yqaj", "summary": "Multiple denial of service vulnerabilites have been found in Open vSwitch.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4337.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4337.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4337", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61531", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.6155", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61564", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61572", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61552", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61594", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61599", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64727", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64694", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64714", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64751", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64724", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00472", "scoring_system": "epss", "scoring_elements": "0.64704", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4338" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027273", "reference_id": "1027273", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027273" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155378", "reference_id": "2155378", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155378" }, { "reference_url": "https://security.gentoo.org/glsa/202311-16", "reference_id": "GLSA-202311-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202311-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0685", "reference_id": "RHSA-2023:0685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0687", "reference_id": "RHSA-2023:0687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0688", "reference_id": "RHSA-2023:0688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0689", "reference_id": "RHSA-2023:0689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0689" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0691", "reference_id": "RHSA-2023:0691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0691" }, { "reference_url": "https://usn.ubuntu.com/5890-1/", "reference_id": "USN-5890-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5890-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" } ], "aliases": [ "CVE-2022-4337" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-buc7-dne2-yqaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61172?format=api", "vulnerability_id": "VCID-d8d2-d81a-nkgk", "summary": "Multiple denial of service vulnerabilites have been found in Open vSwitch.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4338.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4338.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.6828", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.683", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68276", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68328", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.6837", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68357", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68363", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00562", "scoring_system": "epss", "scoring_elements": "0.68377", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70647", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70587", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70637", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70663", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70646", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00641", "scoring_system": "epss", "scoring_elements": "0.70622", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4338" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027273", "reference_id": "1027273", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1027273" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155381", "reference_id": "2155381", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155381" }, { "reference_url": "https://security.gentoo.org/glsa/202311-16", "reference_id": "GLSA-202311-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202311-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0685", "reference_id": "RHSA-2023:0685", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0685" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0687", "reference_id": "RHSA-2023:0687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0688", "reference_id": "RHSA-2023:0688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0689", "reference_id": "RHSA-2023:0689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0689" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0691", "reference_id": "RHSA-2023:0691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0691" }, { "reference_url": "https://usn.ubuntu.com/5890-1/", "reference_id": "USN-5890-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5890-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" } ], "aliases": [ "CVE-2022-4338" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8d2-d81a-nkgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61167?format=api", "vulnerability_id": "VCID-dz8t-nfj7-skgz", "summary": "Multiple denial of service vulnerabilites have been found in Open vSwitch.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27827.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27827.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27827", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61545", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61695", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61703", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61619", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.6172", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61714", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61673", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61704", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61682", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61668", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66264", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.6624", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.6622", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71731", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27827" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921438", "reference_id": "1921438", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921438" }, { "reference_url": "https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html", "reference_id": "379471.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS/", "reference_id": "3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980132", "reference_id": "980132", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980132" }, { "reference_url": "https://security.archlinux.org/ASA-202101-28", "reference_id": "ASA-202101-28", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-28" }, { "reference_url": "https://security.archlinux.org/ASA-202101-29", "reference_id": "ASA-202101-29", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-29" }, { "reference_url": "https://security.archlinux.org/AVG-1451", "reference_id": "AVG-1451", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1451" }, { "reference_url": "https://security.archlinux.org/AVG-1456", "reference_id": "AVG-1456", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1456" }, { "reference_url": "https://security.gentoo.org/glsa/202311-16", "reference_id": "GLSA-202311-16", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://security.gentoo.org/glsa/202311-16" }, { "reference_url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07", "reference_id": "icsa-21-194-07", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYA4AMJXCNF6UPFG36L2TPPT32C242SP/", "reference_id": "JYA4AMJXCNF6UPFG36L2TPPT32C242SP", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYA4AMJXCNF6UPFG36L2TPPT32C242SP/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0497", "reference_id": "RHSA-2021:0497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0834", "reference_id": "RHSA-2021:0834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0835", "reference_id": "RHSA-2021:0835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0837", "reference_id": "RHSA-2021:0837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0976", "reference_id": "RHSA-2021:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0976" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1050", "reference_id": "RHSA-2021:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1050" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1051", "reference_id": "RHSA-2021:1051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2077", "reference_id": "RHSA-2021:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2456", "reference_id": "RHSA-2021:2456", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2456" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9158", "reference_id": "RHSA-2024:9158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9158" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKQWHG2SZJZSGC7PXVDAEJYBN7ESDR7D/", "reference_id": "SKQWHG2SZJZSGC7PXVDAEJYBN7ESDR7D", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKQWHG2SZJZSGC7PXVDAEJYBN7ESDR7D/" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf", "reference_id": "ssa-941426.pdf", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-04T13:38:48Z/" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf" }, { "reference_url": "https://usn.ubuntu.com/4691-1/", "reference_id": "USN-4691-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4691-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" } ], "aliases": [ "CVE-2020-27827" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dz8t-nfj7-skgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61168?format=api", "vulnerability_id": "VCID-jj4q-qp7b-j3hu", "summary": "Multiple denial of service vulnerabilites have been found in Open vSwitch.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35498.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90428", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90522", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90445", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.9045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90476", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90486", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90484", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90498", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90497", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90495", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05765", "scoring_system": "epss", "scoring_elements": "0.90504", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35498" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908845", "reference_id": "1908845", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:22Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908845" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2021/02/10/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:22Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2021/02/10/4" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982493", "reference_id": "982493", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982493" }, { "reference_url": "https://security.archlinux.org/AVG-1564", "reference_id": "AVG-1564", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1564" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4852", "reference_id": "dsa-4852", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:22Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4852" }, { "reference_url": "https://security.gentoo.org/glsa/202311-16", "reference_id": "GLSA-202311-16", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:22Z/" } ], "url": "https://security.gentoo.org/glsa/202311-16" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html", "reference_id": "msg00032.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:22Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0497", "reference_id": "RHSA-2021:0497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0834", "reference_id": "RHSA-2021:0834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0834" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0835", "reference_id": "RHSA-2021:0835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0837", "reference_id": "RHSA-2021:0837", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0837" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1050", "reference_id": "RHSA-2021:1050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1050" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2077", "reference_id": "RHSA-2021:2077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2456", "reference_id": "RHSA-2021:2456", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2456" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJ4DXFJWMZ325ECZXPZOSK7BOEDJZHPR/", "reference_id": "UJ4DXFJWMZ325ECZXPZOSK7BOEDJZHPR", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:22Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJ4DXFJWMZ325ECZXPZOSK7BOEDJZHPR/" }, { "reference_url": "https://usn.ubuntu.com/4729-1/", "reference_id": "USN-4729-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4729-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" } ], "aliases": [ "CVE-2020-35498" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jj4q-qp7b-j3hu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61170?format=api", "vulnerability_id": "VCID-nw3h-mswm-v7d2", "summary": "Multiple denial of service vulnerabilites have been found in Open vSwitch.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36980.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-36980.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36980", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22829", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22661", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22834", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22907", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22978", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22884", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22891", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22853", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22689", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22683", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22681", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22577", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-36980" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36980" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984473", "reference_id": "1984473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1984473" }, { "reference_url": "https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f", "reference_id": "38744b1bcb022c611712527f039722115300f58f", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f" }, { "reference_url": "https://github.com/openvswitch/ovs/commit/65c61b0c23a0d474696d7b1cea522a5016a8aeb3", "reference_id": "65c61b0c23a0d474696d7b1cea522a5016a8aeb3", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://github.com/openvswitch/ovs/commit/65c61b0c23a0d474696d7b1cea522a5016a8aeb3" }, { "reference_url": "https://github.com/openvswitch/ovs/commit/6d67310f4d2524b466b98f05ebccc1add1e8cf35", "reference_id": "6d67310f4d2524b466b98f05ebccc1add1e8cf35", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://github.com/openvswitch/ovs/commit/6d67310f4d2524b466b98f05ebccc1add1e8cf35" }, { "reference_url": "https://github.com/openvswitch/ovs/commit/77cccc74deede443e8b9102299efc869a52b65b2", "reference_id": "77cccc74deede443e8b9102299efc869a52b65b2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://github.com/openvswitch/ovs/commit/77cccc74deede443e8b9102299efc869a52b65b2" }, { "reference_url": "https://github.com/openvswitch/ovs/commit/8ce8dc34b5f73b30ce0c1869af9947013c3c6575", "reference_id": "8ce8dc34b5f73b30ce0c1869af9947013c3c6575", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://github.com/openvswitch/ovs/commit/8ce8dc34b5f73b30ce0c1869af9947013c3c6575" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991308", "reference_id": "991308", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991308" }, { "reference_url": "https://github.com/openvswitch/ovs/commit/9926637a80d0d243dbf9c49761046895e9d1a8e2", "reference_id": "9926637a80d0d243dbf9c49761046895e9d1a8e2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://github.com/openvswitch/ovs/commit/9926637a80d0d243dbf9c49761046895e9d1a8e2" }, { "reference_url": "https://security.archlinux.org/ASA-202107-40", "reference_id": "ASA-202107-40", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202107-40" }, { "reference_url": "https://security.archlinux.org/AVG-2177", "reference_id": "AVG-2177", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2177" }, { "reference_url": "https://security.gentoo.org/glsa/202311-16", "reference_id": "GLSA-202311-16", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://security.gentoo.org/glsa/202311-16" }, { "reference_url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openvswitch/OSV-2020-2197.yaml", "reference_id": "OSV-2020-2197.yaml", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:22:15Z/" } ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openvswitch/OSV-2020-2197.yaml" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3758", "reference_id": "RHSA-2021:3758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3942", "reference_id": "RHSA-2021:3942", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3942" }, { "reference_url": "https://usn.ubuntu.com/5065-1/", "reference_id": "USN-5065-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5065-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" } ], "aliases": [ "CVE-2021-36980" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nw3h-mswm-v7d2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61173?format=api", "vulnerability_id": "VCID-sq5h-zx4v-67hm", "summary": "Multiple denial of service vulnerabilites have been found in Open vSwitch.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1668.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1668.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1668", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47745", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47753", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51784", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51783", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00284", "scoring_system": "epss", "scoring_elements": "0.51732", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55107", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55118", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55098", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.5508", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55122", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55102", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55081", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55056", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55057", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-1668" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1668", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1668" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034042", "reference_id": "1034042", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034042" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137666", "reference_id": "2137666", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137666" }, { "reference_url": "https://security.gentoo.org/glsa/202311-16", "reference_id": "GLSA-202311-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202311-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1765", "reference_id": "RHSA-2023:1765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1766", "reference_id": "RHSA-2023:1766", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1766" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1769", "reference_id": "RHSA-2023:1769", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1769" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1770", "reference_id": "RHSA-2023:1770", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1770" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1823", "reference_id": "RHSA-2023:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1824", "reference_id": "RHSA-2023:1824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3491", "reference_id": "RHSA-2023:3491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3491" }, { "reference_url": "https://usn.ubuntu.com/6068-1/", "reference_id": "USN-6068-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6068-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" } ], "aliases": [ "CVE-2023-1668" ], "risk_score": 3.7, "exploitability": "0.5", "weighted_severity": "7.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sq5h-zx4v-67hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61169?format=api", "vulnerability_id": "VCID-wryy-hpwh-3qgx", "summary": "Multiple denial of service vulnerabilites have been found in Open vSwitch.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3905.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3905.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3905", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37635", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37303", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37354", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37236", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37842", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.3772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.3777", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37783", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37798", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37762", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37737", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37785", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37765", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37467", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00166", "scoring_system": "epss", "scoring_elements": "0.37444", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3905" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019692", "reference_id": "2019692", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019692" }, { "reference_url": "https://security.archlinux.org/AVG-2516", "reference_id": "AVG-2516", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2516" }, { "reference_url": "https://security.gentoo.org/glsa/202311-16", "reference_id": "GLSA-202311-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202311-16" }, { "reference_url": "https://usn.ubuntu.com/5242-1/", "reference_id": "USN-5242-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5242-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85528?format=api", "purl": "pkg:ebuild/net-misc/openvswitch@2.17.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" } ], "aliases": [ "CVE-2021-3905" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wryy-hpwh-3qgx" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/openvswitch@2.17.6" }