cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-2182,https://securityvulnerability.io/vulnerability/CVE-2024-2182,Ovn: insufficient validation of bfd packets may lead to denial of service,"A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.",Red Hat,"Fast Datapath For Red Hat Enterprise Linux 8,Fast Datapath For Red Hat Enterprise Linux 9,Fast Datapath For Rhel 7,Fast Datapath For Rhel 8,Fast Datapath For Rhel 9",6.5,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-03-12T16:18:31.829Z,0 CVE-2023-3966,https://securityvulnerability.io/vulnerability/CVE-2023-3966,Crafted Geneve Packets May Cause Denial of Service and Invalid Memory Accesses in Open vSwitch,"A vulnerability in Open vSwitch has been identified where multiple versions are susceptible to maliciously crafted Geneve packets. This flaw has the potential to lead to denial of service by causing invalid memory accesses. Exploitation of this vulnerability necessitates that hardware offloading via the netlink path is enabled, making systems at risk particularly those that utilize specific network configurations.",Red Hat,"Openvswitch,Fast Datapath For Rhel 7,Fast Datapath For Rhel 8,Fast Datapath For Rhel 9,Red Hat Enterprise Linux 7,Red Hat Openshift Container Platform 3.11,Openstack Rdo,Fedora",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-02-22T12:15:53.128Z,0 CVE-2023-5366,https://securityvulnerability.io/vulnerability/CVE-2023-5366,Openvswitch don't match packets on nd_target field,A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.,Red Hat,"Openvswitch,Fast Datapath For Rhel 7,Fast Datapath For Rhel 8,Fast Datapath For Rhel 9,Red Hat Enterprise Linux 7,Red Hat Openshift Container Platform 3.11,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 16.1,Red Hat Openstack Platform 16.2,Red Hat Virtualization 4,Fedora",5.5,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-10-06T18:15:00.000Z,0 CVE-2023-3153,https://securityvulnerability.io/vulnerability/CVE-2023-3153,Service monitor mac flow is not rate limited,"A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.",Red Hat,"Ovn,Fast Datapath For Rhel 7,Fast Datapath For Rhel 8,Fast Datapath For Rhel 9,Red Hat Openshift Container Platform 4,Red Hat Openstack Platform 13 (queens),Fedora",5.3,MEDIUM,0.0013200000394135714,false,,false,false,false,,,false,false,,2023-10-04T12:15:00.000Z,0