| 0 |
| url |
VCID-1fb2-ccby-7yfq |
| vulnerability_id |
VCID-1fb2-ccby-7yfq |
| summary |
An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-17376 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59774 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5979 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59784 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59629 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59701 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59695 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59726 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59746 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59764 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5978 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59761 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59747 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-17376 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://launchpad.net/bugs/1890501 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://launchpad.net/bugs/1890501 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-17376, GHSA-c7w7-9c85-4qxv, PYSEC-2020-243
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1fb2-ccby-7yfq |
|
| 1 |
| url |
VCID-1p1c-fevy-bydg |
| vulnerability_id |
VCID-1p1c-fevy-bydg |
| summary |
Insufficient Verification of Data Authenticity
It was discovered that the OpenStack Compute (nova) console websocket does not correctly verify the origin header. An attacker could use this flaw to conduct a cross-site websocket hijack attack. Note that only Compute setups with VNC or SPICE enabled were affected by this flaw. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0259 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42631 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42701 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42665 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42648 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42694 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42576 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42674 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42666 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42678 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0259 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-0259, GHSA-x8xr-rm9r-7mvf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1p1c-fevy-bydg |
|
| 2 |
| url |
VCID-1qbm-qguj-gkem |
| vulnerability_id |
VCID-1qbm-qguj-gkem |
| summary |
OpenStack Nova Filter Scheduler Bypass
In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16239 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59788 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59642 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59715 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5974 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5971 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59775 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59794 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59779 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59798 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59804 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16239 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-16239 |
| reference_id |
CVE-2017-16239 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-16239 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16239, GHSA-w2wf-cgwh-vpqg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1qbm-qguj-gkem |
|
| 3 |
| url |
VCID-2dpk-ncrc-1fcw |
| vulnerability_id |
VCID-2dpk-ncrc-1fcw |
| summary |
An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14433 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79871 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79944 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79927 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79919 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79948 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79949 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79952 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79915 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79887 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79899 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79877 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79924 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14433 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://launchpad.net/bugs/1837877 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://launchpad.net/bugs/1837877 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://usn.ubuntu.com/4104-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4104-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-14433, GHSA-pg64-r7rr-phv8, PYSEC-2019-191
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2dpk-ncrc-1fcw |
|
| 4 |
| url |
VCID-4475-ffcq-cff8 |
| vulnerability_id |
VCID-4475-ffcq-cff8 |
| summary |
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when used over libvirt-based hypervisors, allows remote authenticated users to write arbitrary files to the disk image via a .. (dot dot) in the path attribute of a file element. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3360 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80241 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80312 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80308 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80269 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80306 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80276 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80282 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80225 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80233 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80279 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.01381 |
| scoring_system |
epss |
| scoring_elements |
0.80253 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3360 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3360, GHSA-m454-cm7h-rqhh, PYSEC-2012-38
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4475-ffcq-cff8 |
|
| 5 |
| url |
VCID-5nfz-1bk3-93fe |
| vulnerability_id |
VCID-5nfz-1bk3-93fe |
| summary |
OpenStack Nova instance migration process does not stop when instance is deleted
OpenStack Compute (nova) 2015.1 through 2015.1.1, 2014.2.3, and earlier does not stop the migration process when the instance is deleted, which allows remote authenticated users to cause a denial of service (disk, network, and other resource consumption) by resizing and then deleting an instance. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3241 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83569 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83469 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83481 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83496 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83519 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83529 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83537 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83534 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83568 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3241 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3241, GHSA-3vx7-xff6-h2vx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5nfz-1bk3-93fe |
|
| 6 |
| url |
VCID-5tkb-w761-4qc6 |
| vulnerability_id |
VCID-5tkb-w761-4qc6 |
| summary |
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10466 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10489 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10428 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10354 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10494 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10426 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10307 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10334 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10437 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2030 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2030, GHSA-pxxv-rv32-2qgv, PYSEC-2013-45
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5tkb-w761-4qc6 |
|
| 7 |
| url |
VCID-5w9q-vw2n-zfdu |
| vulnerability_id |
VCID-5w9q-vw2n-zfdu |
| summary |
OpenStack Nova Denial of Service in network source security groups
Algorithmic complexity vulnerability in OpenStack Compute (Nova) before 2013.1.3 and Havana before havana-3 does not properly handle network source security group policy updates, which allows remote authenticated users to cause a denial of service (nova-network consumption) via a large number of server-creation operations, which triggers a large number of update requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4185 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68963 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68994 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68992 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69004 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68897 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68914 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69013 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68915 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68965 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68984 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69007 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4185 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4185, GHSA-ph2h-hh49-vh27
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5w9q-vw2n-zfdu |
|
| 8 |
| url |
VCID-6n3z-x4zj-4bez |
| vulnerability_id |
VCID-6n3z-x4zj-4bez |
| summary |
OpenStack Compute (Nova) allows remote attackers to bypass intended restriction
A vulnerability was discovered in the way OpenStack Compute (nova) networking handled security group updates; changes were not applied to already running VM instances. A remote attacker could use this flaw to access running VM instances. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7713 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81283 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81198 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81257 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81262 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81269 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81298 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81261 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7713 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7713, GHSA-67rh-9p29-vrxr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6n3z-x4zj-4bez |
|
| 9 |
| url |
VCID-7wvt-bvww-g7ck |
| vulnerability_id |
VCID-7wvt-bvww-g7ck |
| summary |
OpenStack Compute (Nova) Resource limit circumvention in Nova private flavors
The "create an instance" API in OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly enforce the os-flavor-access:is_public property, which allows remote authenticated users to boot arbitrary flavors by guessing the flavor id. NOTE: this issue is due to an incomplete fix for CVE-2013-2256. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4278 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42242 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42258 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42174 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42257 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4225 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4278 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4278, GHSA-43cm-73px-5v4m
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wvt-bvww-g7ck |
|
| 10 |
| url |
VCID-7yp4-ebnm-g3c3 |
| vulnerability_id |
VCID-7yp4-ebnm-g3c3 |
| summary |
OpenStack Nova host data access through resize/migration
The libvirt driver in OpenStack Compute (Nova) before 2015.1.4 (kilo) and 12.0.x before 12.0.3 (liberty), when using raw storage and use_cow_images is set to false, allows remote authenticated users to read arbitrary files via a crafted qcow2 header in an ephemeral or root disk. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2140 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70304 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70418 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70409 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.7038 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70395 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70371 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70311 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70334 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2140 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2140 |
| reference_id |
CVE-2016-2140 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2140 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2140, GHSA-49jv-37hm-6gfp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp4-ebnm-g3c3 |
|
| 11 |
| url |
VCID-9se5-m6dx-8kcj |
| vulnerability_id |
VCID-9se5-m6dx-8kcj |
| summary |
OpenStack Nova Potential Xen connection password leak via StorageError
The volume_utils._parse_volume_info function in OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty) includes the connection_info dictionary in the StorageError message when using the Xen backend, which might allow attackers to obtain sensitive password information by reading log files or other unspecified vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8749 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76213 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76305 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76321 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76316 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.7628 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76302 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76276 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76262 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.7623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.7625 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76219 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8749 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2015-8749 |
| reference_id |
CVE-2015-8749 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2015-8749 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8749, GHSA-c36r-g737-9qp8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9se5-m6dx-8kcj |
|
| 12 |
| url |
VCID-9vq2-2nsa-bbfa |
| vulnerability_id |
VCID-9vq2-2nsa-bbfa |
| summary |
openstack-nova: Nova VMware driver may connect VNC to another tenant's console |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8750 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76109 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76126 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.7602 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76023 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76056 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76068 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76083 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76108 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76084 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76081 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00929 |
| scoring_system |
epss |
| scoring_elements |
0.76121 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8750 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-8750
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9vq2-2nsa-bbfa |
|
| 13 |
| url |
VCID-az4e-wgmd-gyc3 |
| vulnerability_id |
VCID-az4e-wgmd-gyc3 |
| summary |
OpenStack Compute (Nova) Denial of service due to improper validation of virtual size of QCOW2 image
OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4469 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18849 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18834 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18821 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18907 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18921 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18968 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18918 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19054 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18961 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19106 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4469 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4469, GHSA-2w87-5qcj-j6gx
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-az4e-wgmd-gyc3 |
|
| 14 |
| url |
VCID-bauj-n7jg-gkd2 |
| vulnerability_id |
VCID-bauj-n7jg-gkd2 |
| summary |
OpenStack Compute (Nova) Denial of Service vulnerability
A denial of service flaw was found in the way OpenStack Compute (nova) looked up VM instances based on an IP address filter. An attacker with sufficient privileges on an OpenStack installation with a large amount of VMs could use this flaw to cause the main nova process to block for an extended amount of time. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3708 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77622 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77634 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.7764 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77588 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77595 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77606 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77642 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77545 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77604 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77551 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77578 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3708 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3708, GHSA-43hc-pwvx-pmfg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bauj-n7jg-gkd2 |
|
| 15 |
| url |
VCID-br4q-499g-vqhg |
| vulnerability_id |
VCID-br4q-499g-vqhg |
| summary |
OpenStack Cinder, glance, and Nova vulnerable to Path Traversal
An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47951 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72724 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72732 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72721 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72679 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72682 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72669 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.7263 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72653 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72635 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47951 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://launchpad.net/bugs/1996188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T16:49:04Z/ |
|
|
| url |
https://launchpad.net/bugs/1996188 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-47951, GHSA-7h75-hwxx-qpgc
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-br4q-499g-vqhg |
|
| 16 |
| url |
VCID-c7ya-v12e-8bfq |
| vulnerability_id |
VCID-c7ya-v12e-8bfq |
| summary |
virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3361 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.8023 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.8029 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80286 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80285 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80255 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.8026 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80275 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80257 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80202 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.8021 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.01377 |
| scoring_system |
epss |
| scoring_elements |
0.80247 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3361 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3361, GHSA-cm54-3vvf-f5p8, PYSEC-2012-39
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c7ya-v12e-8bfq |
|
| 17 |
| url |
VCID-cwub-w9dp-wfgy |
| vulnerability_id |
VCID-cwub-w9dp-wfgy |
| summary |
OpenStack Nova DoS by rebuilding the same instance with a new image multiple times
An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This regression was introduced with the fix for OSSA-2017-005 (CVE-2017-16239); however, only Nova stable/pike or later deployments with that fix applied and relying on the default FilterScheduler are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17051 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.7475 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74759 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74752 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74715 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74724 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74745 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74722 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74707 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.747 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74671 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74674 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17051 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-17051 |
| reference_id |
CVE-2017-17051 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:N/A:P |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
|
| 2 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-17051 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17051, GHSA-vq76-rxx3-4r4r
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cwub-w9dp-wfgy |
|
| 18 |
| url |
VCID-cy7p-gzf8-eqcj |
| vulnerability_id |
VCID-cy7p-gzf8-eqcj |
| summary |
OpenStack Nova Denial of service attack on the compute host
An issue was discovered in OpenStack Nova 15.x through 15.1.0 and 16.x through 16.1.1. By detaching and reattaching an encrypted volume, an attacker may access the underlying raw volume and corrupt the LUKS header, resulting in a denial of service attack on the compute host. (The same code error also results in data loss, but that is not a vulnerability because the user loses their own data.) All Nova setups supporting encrypted volumes are affected. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18191 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85295 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85292 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85312 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85282 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85274 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.8522 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85313 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.8531 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85252 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.8525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85232 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18191 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-18191, GHSA-ffmh-r67w-m88f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cy7p-gzf8-eqcj |
|
| 19 |
| url |
VCID-dxxx-4thc-fyfh |
| vulnerability_id |
VCID-dxxx-4thc-fyfh |
| summary |
virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3361. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3447 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.75953 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76039 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76055 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76052 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76012 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76017 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76041 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76016 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.76001 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.75968 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.75989 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00925 |
| scoring_system |
epss |
| scoring_elements |
0.75957 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3447 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://review.openstack.org/#/c/10953 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/10953 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2012-3447 |
| reference_id |
CVE-2012-3447 |
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:N/I:P/A:P |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2012-3447 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3447, GHSA-xc4g-7vw8-924h, PYSEC-2012-21
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dxxx-4thc-fyfh |
|
| 20 |
| url |
VCID-e1f1-xt6n-rqfp |
| vulnerability_id |
VCID-e1f1-xt6n-rqfp |
| summary |
OpenStack Nova Exposure of Sensitive Information to an Unauthorized Actor
OpenStack Nova before 2012.1 allows someone with access to an EC2_ACCESS_KEY (equivalent to a username) to obtain the EC2_SECRET_KEY (equivalent to a password). Exposing the EC2_ACCESS_KEY via http or tools that allow man-in-the-middle over https could allow an attacker to easily obtain the EC2_SECRET_KEY. An attacker could also presumably brute force values for EC2_ACCESS_KEY. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4076 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61248 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61242 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61256 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61235 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.6117 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61198 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61165 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61213 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61228 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61261 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4076 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4076, GHSA-vcmv-6rxx-fh7r
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e1f1-xt6n-rqfp |
|
| 21 |
| url |
VCID-e6ne-73mv-73bc |
| vulnerability_id |
VCID-e6ne-73mv-73bc |
| summary |
OpenStack Nova vulnerable to unauthorized access to potentially sensitive data
In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-40767 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74662 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74671 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74663 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74627 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74635 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74655 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74632 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74618 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74586 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74612 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00835 |
| scoring_system |
epss |
| scoring_elements |
0.74585 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-40767 |
|
| 2 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 3 |
| reference_url |
https://launchpad.net/bugs/2071734 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:47:09Z/ |
|
|
| url |
https://launchpad.net/bugs/2071734 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://security.openstack.org |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:47:09Z/ |
|
|
| url |
https://security.openstack.org |
|
| 8 |
| reference_url |
https://security.openstack.org/ossa/OSSA-2024-002.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:47:09Z/ |
|
|
| url |
https://security.openstack.org/ossa/OSSA-2024-002.html |
|
| 9 |
| reference_url |
https://www.openwall.com/lists/oss-security/2024/07/23/2 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:47:09Z/ |
|
|
| url |
https://www.openwall.com/lists/oss-security/2024/07/23/2 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-40767, GHSA-rm86-h44c-2r2m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e6ne-73mv-73bc |
|
| 22 |
| url |
VCID-ek6e-977t-3bew |
| vulnerability_id |
VCID-ek6e-977t-3bew |
| summary |
OpenStack Compute (nova) allows remote authenticated users to cause a denial of service
A flaw was found in the way OpenStack Compute (nova) handled the resize state. If an authenticated user deleted an instance while it was in the resize state, it could cause the original instance to not be deleted from the compute node it was running on, allowing the user to cause a denial of service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3280 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73965 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.74017 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.7396 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73931 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.74025 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.74016 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73976 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73984 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73925 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.74002 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73935 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3280 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3280, GHSA-mfmj-gwg3-vhw7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ek6e-977t-3bew |
|
| 23 |
| url |
VCID-ekfe-svz5-bbcq |
| vulnerability_id |
VCID-ekfe-svz5-bbcq |
| summary |
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security group rules, which allows remote authenticated users with certain permissions to cause a denial of service (CPU and hard drive consumption) via a network request that triggers a large number of iptables rules. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2101 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75472 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75378 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75382 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75415 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75395 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75447 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75467 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75435 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75477 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00885 |
| scoring_system |
epss |
| scoring_elements |
0.75483 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2101 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2101, GHSA-hq3f-9gf7-73r8, PYSEC-2012-36
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ekfe-svz5-bbcq |
|
| 24 |
| url |
VCID-ex1j-py3q-93hv |
| vulnerability_id |
VCID-ex1j-py3q-93hv |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3517 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60656 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60654 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60632 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60641 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60668 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60495 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60662 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.6057 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.6062 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60598 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60567 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60616 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3517 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3517, GHSA-xjmj-p278-4jp5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1j-py3q-93hv |
|
| 25 |
| url |
VCID-h6rd-5p7q-s3gq |
| vulnerability_id |
VCID-h6rd-5p7q-s3gq |
| summary |
OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access
An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32498 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38394 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38413 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38465 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38489 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38353 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38412 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38391 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00214 |
| scoring_system |
epss |
| scoring_elements |
0.43927 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32498 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://launchpad.net/bugs/2059809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T15:32:53Z/ |
|
|
| url |
https://launchpad.net/bugs/2059809 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://security.openstack.org/ossa/OSSA-2024-001.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T15:32:53Z/ |
|
|
| url |
https://security.openstack.org/ossa/OSSA-2024-001.html |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32498, GHSA-r4v4-w9pv-6fph
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h6rd-5p7q-s3gq |
|
| 26 |
| url |
VCID-hcsa-vfvp-buax |
| vulnerability_id |
VCID-hcsa-vfvp-buax |
| summary |
OpenStack Nova Router metadata queries are not restricted by tenant
Interaction error in OpenStack Nova and Neutron before Havana 2013.2.1 and icehouse-1 does not validate the instance ID of the tenant making a request, which allows remote tenants to obtain sensitive metadata by spoofing the device ID that is bound to a port, which is not properly handled by (1) api/metadata/handler.py in Nova and (2) the neutron-metadata-agent (`agent/metadata/agent.py`) in Neutron. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6419 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68401 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68306 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68326 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68345 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68373 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.6839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68417 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68372 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.6841 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68423 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6419 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6419, GHSA-22w9-j288-8p9w
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hcsa-vfvp-buax |
|
| 27 |
| url |
VCID-hd9e-1msb-uqa6 |
| vulnerability_id |
VCID-hd9e-1msb-uqa6 |
| summary |
openstack-cinder: silently access other user's volumes |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2088 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32352 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32432 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32395 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32367 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32404 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32381 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.3253 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32353 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32402 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00129 |
| scoring_system |
epss |
| scoring_elements |
0.32429 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-2088 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-2088
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hd9e-1msb-uqa6 |
|
| 28 |
| url |
VCID-hgk8-jtvw-9fgb |
| vulnerability_id |
VCID-hgk8-jtvw-9fgb |
| summary |
nova: qpid SSL configuration |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6491 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59896 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59973 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59999 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59969 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60032 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60053 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.6002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.6006 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60067 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60052 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6491 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6491
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hgk8-jtvw-9fgb |
|
| 29 |
| url |
VCID-hur9-b4y5-euek |
| vulnerability_id |
VCID-hur9-b4y5-euek |
| summary |
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly implement a quota for fixed IPs, which allows remote authenticated users to cause a denial of service (resource exhaustion and failure to spawn new instances) via a large number of calls to the addFixedIp function. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1838 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80662 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.8066 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80658 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80575 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80629 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80637 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.8065 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80634 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80624 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80597 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80604 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.01427 |
| scoring_system |
epss |
| scoring_elements |
0.80582 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1838 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2013-1838 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:N/A:P |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2013-1838 |
|
| 17 |
| reference_url |
https://review.openstack.org/#/c/24451 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/24451 |
|
| 18 |
|
| 19 |
| reference_url |
https://review.openstack.org/#/c/24452 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/24452 |
|
| 20 |
|
| 21 |
| reference_url |
https://review.openstack.org/#/c/24453 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/24453 |
|
| 22 |
|
| 23 |
| reference_url |
http://ubuntu.com/usn/usn-1771-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://ubuntu.com/usn/usn-1771-1 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1838, GHSA-63fq-8fp9-vhwq, PYSEC-2013-44
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hur9-b4y5-euek |
|
| 30 |
| url |
VCID-jdb7-71q5-pfcx |
| vulnerability_id |
VCID-jdb7-71q5-pfcx |
| summary |
OpenStack Nova logs sensitive context from notification exceptions
An issue was discovered in exception_wrapper.py in OpenStack Nova 13.x through 13.1.3, 14.x through 14.0.4, and 15.x through 15.0.1. Legacy notification exception contexts appearing in ERROR level logs may include sensitive information such as account passwords and authorization tokens. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7214 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.7973 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79727 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.7965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79657 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79678 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79693 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.797 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79721 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7214 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7214 |
| reference_id |
CVE-2017-7214 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7214 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7214, GHSA-f4g4-cj8f-3cr9
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jdb7-71q5-pfcx |
|
| 31 |
| url |
VCID-jdn1-d4d3-sud7 |
| vulnerability_id |
VCID-jdn1-d4d3-sud7 |
| summary |
The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse before 2014.1, when using libvirt to spawn images and use_cow_images is set to false, allows remote authenticated users to read certain compute host files by overwriting an instance disk with a crafted image. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0134 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42174 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42242 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42258 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4225 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42257 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4217 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0134 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
http://www.ubuntu.com/usn/USN-2247-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2247-1 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0134, GHSA-w429-xc55-hc48, PYSEC-2014-112
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jdn1-d4d3-sud7 |
|
| 32 |
| url |
VCID-k48d-ecqx-m3ed |
| vulnerability_id |
VCID-k48d-ecqx-m3ed |
| summary |
openstack-nova: May fail to delete images in resize state regression |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7498 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84519 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.8454 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84544 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84572 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.8459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84586 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84582 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84601 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84602 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84603 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7498 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7498
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k48d-ecqx-m3ed |
|
| 33 |
| url |
VCID-kncr-vrmh-fygm |
| vulnerability_id |
VCID-kncr-vrmh-fygm |
| summary |
The OpenStack Nova (python-nova) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.2 and 1:2014.1-0 before 1:2014.1-0ubuntu1.2 and Openstack Cinder (python-cinder) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.1 and 1:2014.1-0 before 1:2014.1-0ubuntu1.1 for Ubuntu 13.10 and 14.04 LTS does not properly set the sudo configuration, which makes it easier for attackers to gain privileges by leveraging another vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1068 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44794 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44729 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44809 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.4483 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.4477 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44842 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44811 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44813 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44866 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44859 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1068 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1068
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kncr-vrmh-fygm |
|
| 34 |
| url |
VCID-kqbu-drg3-fycm |
| vulnerability_id |
VCID-kqbu-drg3-fycm |
| summary |
OpenStack Nova denial of service through compressed disk images
OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4463 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19014 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19157 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19034 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19111 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19116 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1925 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19058 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19302 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19097 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1915 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4463 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4463, GHSA-5644-2v3h-5w4x
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kqbu-drg3-fycm |
|
| 35 |
| url |
VCID-m5vc-4my3-87gk |
| vulnerability_id |
VCID-m5vc-4my3-87gk |
| summary |
OpenStack Nova Changing vnic_type breaks compute service restart
An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37394 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18226 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18339 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18199 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18186 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18292 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18438 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18492 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18202 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18285 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00058 |
| scoring_system |
epss |
| scoring_elements |
0.18338 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-37394 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-37394, GHSA-v725-c588-h936
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m5vc-4my3-87gk |
|
| 36 |
| url |
VCID-n6d6-1kyd-qufe |
| vulnerability_id |
VCID-n6d6-1kyd-qufe |
| summary |
OpenStack Compute Nova Improper Access Control
The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4497 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1932 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24049 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23923 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24087 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.2387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23937 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23983 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23956 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.239 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.2391 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4497 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4497, GHSA-27q4-38qf-m25h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n6d6-1kyd-qufe |
|
| 37 |
| url |
VCID-nb1y-cbzs-abhc |
| vulnerability_id |
VCID-nb1y-cbzs-abhc |
| summary |
openstack-nova: Unprivileged API user can access host data using instance snapshot |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7548 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38426 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38399 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38363 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38446 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38461 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7548 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7548
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nb1y-cbzs-abhc |
|
| 38 |
| url |
VCID-nh9z-sxay-fkdv |
| vulnerability_id |
VCID-nh9z-sxay-fkdv |
| summary |
The Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when DifferentHostFilter or SameHostFilter is enabled, allows remote authenticated users to cause a denial of service (excessive database lookup calls and server hang) via a request with many repeated IDs in the os:scheduler_hints section. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3371 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75319 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75396 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75406 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75362 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.754 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75359 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.7537 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75392 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75305 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75309 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75372 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00881 |
| scoring_system |
epss |
| scoring_elements |
0.75341 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3371 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3371, GHSA-xxgm-qpj5-4886, PYSEC-2012-40
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nh9z-sxay-fkdv |
|
| 39 |
| url |
VCID-nryd-hrub-cydj |
| vulnerability_id |
VCID-nryd-hrub-cydj |
| summary |
OpenStack Compute (Nova) Folsom before 2012.2.2 and Grizzly, when using libvirt and LVM backed instances, does not properly clear physical volume (PV) content when reallocating for instances, which allows attackers to obtain sensitive information by reading the memory of the previous logical volume (LV). |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5625 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77641 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77551 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77558 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77584 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77564 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77594 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77601 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77628 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77612 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77611 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77648 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77646 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5625 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5625, GHSA-rwhr-h69g-8qmq, PYSEC-2012-41
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nryd-hrub-cydj |
|
| 40 |
| url |
VCID-p288-4te1-6qhc |
| vulnerability_id |
VCID-p288-4te1-6qhc |
| summary |
Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0030 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67862 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67886 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67904 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67884 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67934 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67948 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67972 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67959 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67923 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67961 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67974 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00549 |
| scoring_system |
epss |
| scoring_elements |
0.67955 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0030 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-0030
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p288-4te1-6qhc |
|
| 41 |
| url |
VCID-q246-vzd6-3qfb |
| vulnerability_id |
VCID-q246-vzd6-3qfb |
| summary |
OpenStack Compute (Nova) allows remote authenticated users to gain privileges via API requests
The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authenticated users to gain privileges via these API requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59675 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59639 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59523 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59596 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59621 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59591 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59642 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59664 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.5968 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59672 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0167 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0167, GHSA-p258-xmh3-72pv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q246-vzd6-3qfb |
|
| 42 |
| url |
VCID-q9q9-jegz-pfa2 |
| vulnerability_id |
VCID-q9q9-jegz-pfa2 |
| summary |
OpenStack Nova Multiple directory traversal vulnerabilities
Multiple directory traversal vulnerabilities in OpenStack Nova before 2011.3.1, when the EC2 API and the S3/RegisterImage image-registration method are enabled, allow remote authenticated users to overwrite arbitrary files via a crafted (1) tarball or (2) manifest. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4596 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67652 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67675 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67641 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67622 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67666 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67674 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67564 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67601 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00541 |
| scoring_system |
epss |
| scoring_elements |
0.67689 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-4596 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-4596, GHSA-qr62-r9xc-r2gj
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q9q9-jegz-pfa2 |
|
| 43 |
| url |
VCID-qb9p-rpza-5fa5 |
| vulnerability_id |
VCID-qb9p-rpza-5fa5 |
| summary |
OpenStack Compute (Nova) allows remote authenticated users to obtain sensitive information
CVE-2013-2256 OpenStack: Nova private flavors resource limit circumvention |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2256 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64672 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64706 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64712 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64593 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64719 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64674 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64632 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.6468 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64695 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2256 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2256, GHSA-5mj6-643f-2g85
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qb9p-rpza-5fa5 |
|
| 44 |
| url |
VCID-qe1w-wnfu-mudr |
| vulnerability_id |
VCID-qe1w-wnfu-mudr |
| summary |
OpenStack: openstack-nova-compute console-log DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4261 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69285 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69297 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69294 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69345 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69384 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69368 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69404 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4261 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4261
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1w-wnfu-mudr |
|
| 45 |
| url |
VCID-qfdm-g857-3yb5 |
| vulnerability_id |
VCID-qfdm-g857-3yb5 |
| summary |
OpenStack Nova can leak consoleauth token into log files
An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to `NovaProxyRequestHandlerBase.new_websocket_client` in `console/websocketproxy.py`. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-9543 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24153 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24147 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2419 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24173 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2423 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24273 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24201 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2433 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24364 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24213 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-9543 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-9543, GHSA-22jm-4hxw-35jf
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qfdm-g857-3yb5 |
|
| 46 |
| url |
VCID-qnhs-qv3p-myg2 |
| vulnerability_id |
VCID-qnhs-qv3p-myg2 |
| summary |
The VMWare driver in OpenStack Compute (Nova) 2013.2 through 2013.2.2 does not properly put VMs into RESCUE status, which allows remote authenticated users to bypass the quota limit and cause a denial of service (resource consumption) by requesting the VM be put into rescue and then deleting the image. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2573 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28596 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28643 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28668 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28648 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.2874 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28736 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28698 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28632 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28826 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28696 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2573 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2573, GHSA-jv34-xvjq-ppch, PYSEC-2014-113
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qnhs-qv3p-myg2 |
|
| 47 |
| url |
VCID-r558-z5xb-v3a8 |
| vulnerability_id |
VCID-r558-z5xb-v3a8 |
| summary |
OpenStack Nova VMware instance leak potentially leading to compute DoS
The VMware driver in OpenStack Compute (Nova) before 2014.1.4 allows remote authenticated users to cause a denial of service (disk consumption) by deleting an instance in the resize state. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8333 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72857 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72761 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.728 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72814 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72838 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72813 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72854 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72865 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72758 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72765 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72786 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8333 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-8333, GHSA-g63p-mfcm-54c4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r558-z5xb-v3a8 |
|
| 48 |
| url |
VCID-rqyj-x6hj-g7fp |
| vulnerability_id |
VCID-rqyj-x6hj-g7fp |
| summary |
OpenStack Nova Long server names grow nova-api log files significantly
OpenStack Compute (Nova) Essex before 2011.3 allows remote authenticated users to cause a denial of service (Nova-API log file and disk consumption) via a long server name. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1585 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.6483 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64834 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64823 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64795 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64833 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64843 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.6471 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64761 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.6479 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64753 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64803 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64817 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1585 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1585, GHSA-pjvw-p2v5-wf6q
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rqyj-x6hj-g7fp |
|
| 49 |
| url |
VCID-rvp9-etcr-wycj |
| vulnerability_id |
VCID-rvp9-etcr-wycj |
| summary |
OpenStack Nova DoS through ephemeral disk backing files
The libvirt driver in OpenStack Compute (Nova) before 2013.2.2 and icehouse before icehouse-2 allows remote authenticated users to cause a denial of service (disk consumption) by creating and deleting instances with unique os_type settings, which triggers the creation of a new ephemeral disk backing file. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62857 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62809 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62837 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62843 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62706 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62762 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62832 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62793 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62757 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62808 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6437 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6437, GHSA-hrv9-4x4c-9jc8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rvp9-etcr-wycj |
|
| 50 |
| url |
VCID-s69v-tc7x-37fe |
| vulnerability_id |
VCID-s69v-tc7x-37fe |
| summary |
OpenStack Nova calls qemu-img without format restrictions for resize
An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24708 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03778 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18797 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18759 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18747 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22081 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21988 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21907 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22132 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22017 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22043 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24708 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-24708, GHSA-m4f3-qp2w-gwh6
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s69v-tc7x-37fe |
|
| 51 |
| url |
VCID-sj2k-uq1g-suby |
| vulnerability_id |
VCID-sj2k-uq1g-suby |
| summary |
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-4179 OpenStack: Nova XML entities DoS |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4179 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.7133 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71344 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71365 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71267 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71275 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71359 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71292 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71309 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71322 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4179 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4179, GHSA-j6xh-q826-55jw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sj2k-uq1g-suby |
|
| 52 |
| url |
VCID-t2sh-b3m5-vyax |
| vulnerability_id |
VCID-t2sh-b3m5-vyax |
| summary |
OpenStack Compute (Nova) does not verify the virtual size of a QCOW2 image
OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by creating an image with a large virtual size that does not contain a large amount of data. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1919 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19277 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19413 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19179 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19258 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1931 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19315 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19267 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19213 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19171 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1918 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2096 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2096, GHSA-m674-hmx2-ffhq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2sh-b3m5-vyax |
|
| 53 |
| url |
VCID-t88t-p8tx-cfcu |
| vulnerability_id |
VCID-t88t-p8tx-cfcu |
| summary |
Multiple vulnerabilities have been found in libxml2, allowing
remote attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88332 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88285 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88293 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88308 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88349 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88353 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.8834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88348 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88338 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1664 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1664, GHSA-qrh7-x6fp-c2mp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t88t-p8tx-cfcu |
|
| 54 |
| url |
VCID-tbxf-ky56-w7h5 |
| vulnerability_id |
VCID-tbxf-ky56-w7h5 |
| summary |
openstack-nova: Boot from volume allows access to random volumes |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0208 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76427 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.7634 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76343 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76352 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76398 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76424 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76402 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76397 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76437 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76443 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0208 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0208
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tbxf-ky56-w7h5 |
|
| 55 |
| url |
VCID-v47b-k4qx-h7a2 |
| vulnerability_id |
VCID-v47b-k4qx-h7a2 |
| summary |
OpenStack Nova live snapshots use an insecure local directory
OpenStack Compute (Nova) Grizzly 2013.1.4, Havana 2013.2.1, and earlier uses world-writable and world-readable permissions for the temporary directory used to store live snapshots, which allows local users to read and modify live snapshots. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1722 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17179 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1724 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17299 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17186 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17278 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17349 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17193 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1736 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17336 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17406 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7048 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7048, GHSA-grp5-h379-j75x
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v47b-k4qx-h7a2 |
|
| 56 |
| url |
VCID-v87z-d6p9-43c5 |
| vulnerability_id |
VCID-v87z-d6p9-43c5 |
| summary |
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2654 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78754 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78682 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78688 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78719 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78701 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78726 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78733 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78758 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.7874 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78731 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.7876 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-2654 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-2654, GHSA-46r8-9cj7-pw6g, PYSEC-2012-37
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v87z-d6p9-43c5 |
|
| 57 |
| url |
VCID-vena-h39k-v3fe |
| vulnerability_id |
VCID-vena-h39k-v3fe |
| summary |
The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver in OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, when using KVM live block migration, does not properly create all expected files, which allows attackers to obtain snapshot root disk contents of other users via ephemeral storage. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
http://osvdb.org/102416 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://osvdb.org/102416 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7130 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85385 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85487 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85482 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.8545 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.8542 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85483 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7130 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://review.openstack.org/#/c/68658 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/68658 |
|
| 17 |
|
| 18 |
| reference_url |
https://review.openstack.org/#/c/68659 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/68659 |
|
| 19 |
|
| 20 |
| reference_url |
https://review.openstack.org/#/c/68660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/68660 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
| reference_url |
http://www.ubuntu.com/usn/USN-2247-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2247-1 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-7130, GHSA-99rx-9x8v-9j8p, PYSEC-2014-111
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vena-h39k-v3fe |
|
| 58 |
| url |
VCID-wvc4-8zmb-6ucg |
| vulnerability_id |
VCID-wvc4-8zmb-6ucg |
| summary |
Openstack nova qcow format could expose host filesystem information
Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3147 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39846 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.399 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39913 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39868 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39918 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39889 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39747 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39895 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39923 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3147 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3147, GHSA-hqfx-4x4w-vmwp
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wvc4-8zmb-6ucg |
|
| 59 |
| url |
VCID-x5k4-dm9d-xkf7 |
| vulnerability_id |
VCID-x5k4-dm9d-xkf7 |
| summary |
OpenStack Compute (Nova)'s VMWare driver vulnerable to denial of service
CVE-2014-3608 openstack-nova: incomplete fix for CVE-2014-2573, Nova VMware driver still leaks rescued images |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3608 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71756 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.7177 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71788 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71698 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71737 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71749 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71773 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71782 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71699 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71739 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71706 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71725 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3608 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3608, GHSA-92hc-c226-32q7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x5k4-dm9d-xkf7 |
|
| 60 |
| url |
VCID-y8va-eyt2-3kfv |
| vulnerability_id |
VCID-y8va-eyt2-3kfv |
| summary |
OpenStack Compute (nova) Icehouse, Juno and Havana when live migration fails allows local users to access VM volumes that they would normally not have permissions for. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15948 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15876 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15831 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15817 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15892 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1596 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15998 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15958 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15872 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16075 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16012 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2687 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://review.openstack.org/#/c/338929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/338929 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-2687, GHSA-97fv-22hc-mrgj, PYSEC-2017-145
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y8va-eyt2-3kfv |
|
| 61 |
| url |
VCID-ykzj-fz7y-eug8 |
| vulnerability_id |
VCID-ykzj-fz7y-eug8 |
| summary |
Trove: potential leak of passwords into log files |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31358 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31368 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31547 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31365 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31419 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31449 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31452 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31373 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31407 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31387 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7230 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-7230
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ykzj-fz7y-eug8 |
|
| 62 |
| url |
VCID-z5wc-py2m-6qhz |
| vulnerability_id |
VCID-z5wc-py2m-6qhz |
| summary |
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to gain access to a VM in opportunistic circumstances by using the VNC token for a deleted VM that was bound to the same VNC port. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0335 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77423 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77335 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77341 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.7737 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.7735 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.7738 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77389 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77415 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77395 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77392 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77432 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01036 |
| scoring_system |
epss |
| scoring_elements |
0.77431 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0335 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 13 |
|
| 14 |
| reference_url |
https://review.openstack.org/#/c/22086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/22086 |
|
| 15 |
|
| 16 |
| reference_url |
https://review.openstack.org/#/c/22758 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/22758 |
|
| 17 |
| reference_url |
https://review.openstack.org/#/c/22872 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/22872 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
| reference_url |
http://www.ubuntu.com/usn/USN-1771-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-1771-1 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2013-0335 |
| reference_id |
CVE-2013-0335 |
| reference_type |
|
| scores |
| 0 |
| value |
6.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2013-0335 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0335, GHSA-qfp8-hfqx-c79c, PYSEC-2013-43
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z5wc-py2m-6qhz |
|
| 63 |
| url |
VCID-zwuz-pgjz-rkb9 |
| vulnerability_id |
VCID-zwuz-pgjz-rkb9 |
| summary |
URL Redirection to Untrusted Site ('Open Redirect')
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3654 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.87234 |
| scoring_system |
epss |
| scoring_elements |
0.99453 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.87234 |
| scoring_system |
epss |
| scoring_elements |
0.99452 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.87248 |
| scoring_system |
epss |
| scoring_elements |
0.99449 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.87248 |
| scoring_system |
epss |
| scoring_elements |
0.99453 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.87248 |
| scoring_system |
epss |
| scoring_elements |
0.9945 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.87248 |
| scoring_system |
epss |
| scoring_elements |
0.99445 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.87248 |
| scoring_system |
epss |
| scoring_elements |
0.99444 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.87248 |
| scoring_system |
epss |
| scoring_elements |
0.99446 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.87248 |
| scoring_system |
epss |
| scoring_elements |
0.99448 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3654 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3654, GHSA-vqp6-j452-j6wp
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zwuz-pgjz-rkb9 |
|
| 64 |
| url |
VCID-zy9m-d25c-5uga |
| vulnerability_id |
VCID-zy9m-d25c-5uga |
| summary |
OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption
A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87769 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87701 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87712 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87723 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87725 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87746 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87752 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87763 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87757 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87756 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.8777 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5162 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5162, GHSA-g2j5-7vgx-6xrx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zy9m-d25c-5uga |
|