| 0 |
| url |
VCID-1fb2-ccby-7yfq |
| vulnerability_id |
VCID-1fb2-ccby-7yfq |
| summary |
An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-17376 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5979 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59784 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59746 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59629 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59764 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5978 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59761 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59747 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59695 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59726 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59701 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-17376 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://launchpad.net/bugs/1890501 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://launchpad.net/bugs/1890501 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-17376, GHSA-c7w7-9c85-4qxv, PYSEC-2020-243
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1fb2-ccby-7yfq |
|
| 1 |
| url |
VCID-1p1c-fevy-bydg |
| vulnerability_id |
VCID-1p1c-fevy-bydg |
| summary |
Insufficient Verification of Data Authenticity
It was discovered that the OpenStack Compute (nova) console websocket does not correctly verify the origin header. An attacker could use this flaw to conduct a cross-site websocket hijack attack. Note that only Compute setups with VNC or SPICE enabled were affected by this flaw. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0259 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42694 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42678 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42701 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42665 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42648 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42576 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42674 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42666 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-0259 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2015-0259, GHSA-x8xr-rm9r-7mvf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1p1c-fevy-bydg |
|
| 2 |
| url |
VCID-1qbm-qguj-gkem |
| vulnerability_id |
VCID-1qbm-qguj-gkem |
| summary |
OpenStack Nova Filter Scheduler Bypass
In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16239 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59804 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59642 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59715 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5974 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.5971 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59775 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59794 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59779 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00385 |
| scoring_system |
epss |
| scoring_elements |
0.59798 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16239 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-16239 |
| reference_id |
CVE-2017-16239 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-16239 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16239, GHSA-w2wf-cgwh-vpqg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1qbm-qguj-gkem |
|
| 3 |
| url |
VCID-2dpk-ncrc-1fcw |
| vulnerability_id |
VCID-2dpk-ncrc-1fcw |
| summary |
An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14433 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79871 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79924 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79944 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79927 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79919 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79948 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79949 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79887 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79899 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79877 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.01327 |
| scoring_system |
epss |
| scoring_elements |
0.79915 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-14433 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://launchpad.net/bugs/1837877 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://launchpad.net/bugs/1837877 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://usn.ubuntu.com/4104-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4104-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-14433, GHSA-pg64-r7rr-phv8, PYSEC-2019-191
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2dpk-ncrc-1fcw |
|
| 4 |
| url |
VCID-5nfz-1bk3-93fe |
| vulnerability_id |
VCID-5nfz-1bk3-93fe |
| summary |
OpenStack Nova instance migration process does not stop when instance is deleted
OpenStack Compute (nova) 2015.1 through 2015.1.1, 2014.2.3, and earlier does not stop the migration process when the instance is deleted, which allows remote authenticated users to cause a denial of service (disk, network, and other resource consumption) by resizing and then deleting an instance. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3241 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83569 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83469 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83481 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83496 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83495 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83519 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83529 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83537 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83534 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0197 |
| scoring_system |
epss |
| scoring_elements |
0.83568 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3241 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3241, GHSA-3vx7-xff6-h2vx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5nfz-1bk3-93fe |
|
| 5 |
| url |
VCID-5w9q-vw2n-zfdu |
| vulnerability_id |
VCID-5w9q-vw2n-zfdu |
| summary |
OpenStack Nova Denial of Service in network source security groups
Algorithmic complexity vulnerability in OpenStack Compute (Nova) before 2013.1.3 and Havana before havana-3 does not properly handle network source security group policy updates, which allows remote authenticated users to cause a denial of service (nova-network consumption) via a large number of server-creation operations, which triggers a large number of update requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4185 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68992 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69013 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69007 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68963 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68897 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68914 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.69004 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68935 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68915 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68965 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00583 |
| scoring_system |
epss |
| scoring_elements |
0.68984 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4185 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-4185, GHSA-ph2h-hh49-vh27
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5w9q-vw2n-zfdu |
|
| 6 |
| url |
VCID-6n3z-x4zj-4bez |
| vulnerability_id |
VCID-6n3z-x4zj-4bez |
| summary |
OpenStack Compute (Nova) allows remote attackers to bypass intended restriction
A vulnerability was discovered in the way OpenStack Compute (nova) networking handled security group updates; changes were not applied to already running VM instances. A remote attacker could use this flaw to access running VM instances. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7713 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81283 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81198 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81257 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81262 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81269 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81299 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81298 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01522 |
| scoring_system |
epss |
| scoring_elements |
0.81261 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7713 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7713, GHSA-67rh-9p29-vrxr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6n3z-x4zj-4bez |
|
| 7 |
| url |
VCID-7wvt-bvww-g7ck |
| vulnerability_id |
VCID-7wvt-bvww-g7ck |
| summary |
OpenStack Compute (Nova) Resource limit circumvention in Nova private flavors
The "create an instance" API in OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly enforce the os-flavor-access:is_public property, which allows remote authenticated users to boot arbitrary flavors by guessing the flavor id. NOTE: this issue is due to an incomplete fix for CVE-2013-2256. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4278 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4225 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42242 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42258 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42257 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42199 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4278 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-4278, GHSA-43cm-73px-5v4m
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wvt-bvww-g7ck |
|
| 8 |
| url |
VCID-7yp4-ebnm-g3c3 |
| vulnerability_id |
VCID-7yp4-ebnm-g3c3 |
| summary |
OpenStack Nova host data access through resize/migration
The libvirt driver in OpenStack Compute (Nova) before 2015.1.4 (kilo) and 12.0.x before 12.0.3 (liberty), when using raw storage and use_cow_images is set to false, allows remote authenticated users to read arbitrary files via a crafted qcow2 header in an ephemeral or root disk. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2140 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70304 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70418 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70409 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.7038 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70395 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70371 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70311 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70334 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00634 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2140 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2140 |
| reference_id |
CVE-2016-2140 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2140 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-2140, GHSA-49jv-37hm-6gfp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7yp4-ebnm-g3c3 |
|
| 9 |
| url |
VCID-9se5-m6dx-8kcj |
| vulnerability_id |
VCID-9se5-m6dx-8kcj |
| summary |
OpenStack Nova Potential Xen connection password leak via StorageError
The volume_utils._parse_volume_info function in OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty) includes the connection_info dictionary in the StorageError message when using the Xen backend, which might allow attackers to obtain sensitive password information by reading log files or other unspecified vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8749 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76213 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76321 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76316 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.7628 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76302 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76276 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76262 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.7623 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.7625 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00942 |
| scoring_system |
epss |
| scoring_elements |
0.76219 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8749 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2015-8749 |
| reference_id |
CVE-2015-8749 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2015-8749 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-8749, GHSA-c36r-g737-9qp8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9se5-m6dx-8kcj |
|
| 10 |
| url |
VCID-az4e-wgmd-gyc3 |
| vulnerability_id |
VCID-az4e-wgmd-gyc3 |
| summary |
OpenStack Compute (Nova) Denial of service due to improper validation of virtual size of QCOW2 image
OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4469 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19106 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18834 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18821 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.1887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18921 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18968 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18961 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18918 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19054 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18907 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4469 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-4469, GHSA-2w87-5qcj-j6gx
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-az4e-wgmd-gyc3 |
|
| 11 |
| url |
VCID-bauj-n7jg-gkd2 |
| vulnerability_id |
VCID-bauj-n7jg-gkd2 |
| summary |
OpenStack Compute (Nova) Denial of Service vulnerability
A denial of service flaw was found in the way OpenStack Compute (nova) looked up VM instances based on an IP address filter. An attacker with sufficient privileges on an OpenStack installation with a large amount of VMs could use this flaw to cause the main nova process to block for an extended amount of time. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3708 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77595 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.7764 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77642 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77588 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77622 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77604 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77545 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77606 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.01057 |
| scoring_system |
epss |
| scoring_elements |
0.77551 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3708 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-3708, GHSA-43hc-pwvx-pmfg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bauj-n7jg-gkd2 |
|
| 12 |
| url |
VCID-br4q-499g-vqhg |
| vulnerability_id |
VCID-br4q-499g-vqhg |
| summary |
OpenStack Cinder, glance, and Nova vulnerable to Path Traversal
An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47951 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72732 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72721 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72679 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72682 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72669 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.7263 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72653 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72635 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47951 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://launchpad.net/bugs/1996188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T16:49:04Z/ |
|
|
| url |
https://launchpad.net/bugs/1996188 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-47951, GHSA-7h75-hwxx-qpgc
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-br4q-499g-vqhg |
|
| 13 |
| url |
VCID-cwub-w9dp-wfgy |
| vulnerability_id |
VCID-cwub-w9dp-wfgy |
| summary |
OpenStack Nova DoS by rebuilding the same instance with a new image multiple times
An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This regression was introduced with the fix for OSSA-2017-005 (CVE-2017-16239); however, only Nova stable/pike or later deployments with that fix applied and relying on the default FilterScheduler are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17051 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74759 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74752 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74715 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74724 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74745 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74722 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74707 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.747 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74671 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00841 |
| scoring_system |
epss |
| scoring_elements |
0.74674 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17051 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-17051 |
| reference_id |
CVE-2017-17051 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:N/A:P |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
|
| 2 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-17051 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17051, GHSA-vq76-rxx3-4r4r
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cwub-w9dp-wfgy |
|
| 14 |
| url |
VCID-cy7p-gzf8-eqcj |
| vulnerability_id |
VCID-cy7p-gzf8-eqcj |
| summary |
OpenStack Nova Denial of service attack on the compute host
An issue was discovered in OpenStack Nova 15.x through 15.1.0 and 16.x through 16.1.1. By detaching and reattaching an encrypted volume, an attacker may access the underlying raw volume and corrupt the LUKS header, resulting in a denial of service attack on the compute host. (The same code error also results in data loss, but that is not a vulnerability because the user loses their own data.) All Nova setups supporting encrypted volumes are affected. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18191 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.8525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85232 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85313 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85292 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85295 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85297 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85282 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85274 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85252 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.8522 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.02481 |
| scoring_system |
epss |
| scoring_elements |
0.85312 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18191 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-18191, GHSA-ffmh-r67w-m88f
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cy7p-gzf8-eqcj |
|
| 15 |
| url |
VCID-ek6e-977t-3bew |
| vulnerability_id |
VCID-ek6e-977t-3bew |
| summary |
OpenStack Compute (nova) allows remote authenticated users to cause a denial of service
A flaw was found in the way OpenStack Compute (nova) handled the resize state. If an authenticated user deleted an instance while it was in the resize state, it could cause the original instance to not be deleted from the compute node it was running on, allowing the user to cause a denial of service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3280 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73931 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.74025 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73935 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.7396 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73965 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.74016 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73976 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73984 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.74002 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73925 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00795 |
| scoring_system |
epss |
| scoring_elements |
0.73979 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3280 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3280, GHSA-mfmj-gwg3-vhw7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ek6e-977t-3bew |
|
| 16 |
| url |
VCID-ex1j-py3q-93hv |
| vulnerability_id |
VCID-ex1j-py3q-93hv |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3517 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60668 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60567 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60632 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60656 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60641 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.6062 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60662 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60495 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.6057 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60598 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3517 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-3517, GHSA-xjmj-p278-4jp5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1j-py3q-93hv |
|
| 17 |
| url |
VCID-h6rd-5p7q-s3gq |
| vulnerability_id |
VCID-h6rd-5p7q-s3gq |
| summary |
OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access
An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32498 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38394 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38413 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38465 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38489 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38353 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38412 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38391 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32498 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://launchpad.net/bugs/2059809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T15:32:53Z/ |
|
|
| url |
https://launchpad.net/bugs/2059809 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://security.openstack.org/ossa/OSSA-2024-001.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T15:32:53Z/ |
|
|
| url |
https://security.openstack.org/ossa/OSSA-2024-001.html |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32498, GHSA-r4v4-w9pv-6fph
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h6rd-5p7q-s3gq |
|
| 18 |
| url |
VCID-hcsa-vfvp-buax |
| vulnerability_id |
VCID-hcsa-vfvp-buax |
| summary |
OpenStack Nova Router metadata queries are not restricted by tenant
Interaction error in OpenStack Nova and Neutron before Havana 2013.2.1 and icehouse-1 does not validate the instance ID of the tenant making a request, which allows remote tenants to obtain sensitive metadata by spoofing the device ID that is bound to a port, which is not properly handled by (1) api/metadata/handler.py in Nova and (2) the neutron-metadata-agent (`agent/metadata/agent.py`) in Neutron. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6419 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68423 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68306 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68326 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68345 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68373 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.6839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68417 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68404 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.68372 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00563 |
| scoring_system |
epss |
| scoring_elements |
0.6841 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6419 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-6419, GHSA-22w9-j288-8p9w
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hcsa-vfvp-buax |
|
| 19 |
| url |
VCID-hgk8-jtvw-9fgb |
| vulnerability_id |
VCID-hgk8-jtvw-9fgb |
| summary |
nova: qpid SSL configuration |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6491 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59896 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59973 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59999 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.59969 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60019 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60032 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60053 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.6002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.6006 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00389 |
| scoring_system |
epss |
| scoring_elements |
0.60067 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6491 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-6491
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hgk8-jtvw-9fgb |
|
| 20 |
| url |
VCID-jdb7-71q5-pfcx |
| vulnerability_id |
VCID-jdb7-71q5-pfcx |
| summary |
OpenStack Nova logs sensitive context from notification exceptions
An issue was discovered in exception_wrapper.py in OpenStack Nova 13.x through 13.1.3, 14.x through 14.0.4, and 15.x through 15.0.1. Legacy notification exception contexts appearing in ERROR level logs may include sensitive information such as account passwords and authorization tokens. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7214 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79727 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79721 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.7965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.797 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79693 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79657 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79678 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7214 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7214 |
| reference_id |
CVE-2017-7214 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7214 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7214, GHSA-f4g4-cj8f-3cr9
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jdb7-71q5-pfcx |
|
| 21 |
| url |
VCID-jdn1-d4d3-sud7 |
| vulnerability_id |
VCID-jdn1-d4d3-sud7 |
| summary |
The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse before 2014.1, when using libvirt to spawn images and use_cow_images is set to false, allows remote authenticated users to read certain compute host files by overwriting an instance disk with a crafted image. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0134 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42242 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42266 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42258 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.4225 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42199 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42257 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42228 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0134 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
http://www.ubuntu.com/usn/USN-2247-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2247-1 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-0134, GHSA-w429-xc55-hc48, PYSEC-2014-112
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jdn1-d4d3-sud7 |
|
| 22 |
| url |
VCID-k48d-ecqx-m3ed |
| vulnerability_id |
VCID-k48d-ecqx-m3ed |
| summary |
openstack-nova: May fail to delete images in resize state regression |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7498 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84519 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.8454 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84544 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84565 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84572 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.8459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84586 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84582 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84601 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.02248 |
| scoring_system |
epss |
| scoring_elements |
0.84602 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7498 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7498
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k48d-ecqx-m3ed |
|
| 23 |
| url |
VCID-kncr-vrmh-fygm |
| vulnerability_id |
VCID-kncr-vrmh-fygm |
| summary |
The OpenStack Nova (python-nova) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.2 and 1:2014.1-0 before 1:2014.1-0ubuntu1.2 and Openstack Cinder (python-cinder) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.1 and 1:2014.1-0 before 1:2014.1-0ubuntu1.1 for Ubuntu 13.10 and 14.04 LTS does not properly set the sudo configuration, which makes it easier for attackers to gain privileges by leveraging another vulnerability. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1068 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44859 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44729 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44809 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.4483 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.4477 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44842 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44811 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44813 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44866 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1068 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-1068
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kncr-vrmh-fygm |
|
| 24 |
| url |
VCID-kqbu-drg3-fycm |
| vulnerability_id |
VCID-kqbu-drg3-fycm |
| summary |
OpenStack Nova denial of service through compressed disk images
OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4463 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19058 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1915 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19014 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19157 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19116 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1925 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19111 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19302 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19097 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4463 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-4463, GHSA-5644-2v3h-5w4x
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kqbu-drg3-fycm |
|
| 25 |
| url |
VCID-n6d6-1kyd-qufe |
| vulnerability_id |
VCID-n6d6-1kyd-qufe |
| summary |
OpenStack Compute Nova Improper Access Control
The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4497 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.2391 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23923 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24049 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24087 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.2387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23937 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23983 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23956 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.239 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4497 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-4497, GHSA-27q4-38qf-m25h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n6d6-1kyd-qufe |
|
| 26 |
| url |
VCID-nb1y-cbzs-abhc |
| vulnerability_id |
VCID-nb1y-cbzs-abhc |
| summary |
openstack-nova: Unprivileged API user can access host data using instance snapshot |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7548 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38426 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38424 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38399 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38363 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38446 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38461 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7548 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7548
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nb1y-cbzs-abhc |
|
| 27 |
| url |
VCID-q246-vzd6-3qfb |
| vulnerability_id |
VCID-q246-vzd6-3qfb |
| summary |
OpenStack Compute (Nova) allows remote authenticated users to gain privileges via API requests
The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authenticated users to gain privileges via these API requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59675 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59639 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59523 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59596 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59621 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59591 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59642 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59655 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.5968 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00383 |
| scoring_system |
epss |
| scoring_elements |
0.59672 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0167 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-0167, GHSA-p258-xmh3-72pv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q246-vzd6-3qfb |
|
| 28 |
| url |
VCID-qb9p-rpza-5fa5 |
| vulnerability_id |
VCID-qb9p-rpza-5fa5 |
| summary |
OpenStack Compute (Nova) allows remote authenticated users to obtain sensitive information
CVE-2013-2256 OpenStack: Nova private flavors resource limit circumvention |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2256 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.647 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64719 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64695 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64712 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64672 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64593 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64708 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64674 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.64632 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00472 |
| scoring_system |
epss |
| scoring_elements |
0.6468 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2256 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-2256, GHSA-5mj6-643f-2g85
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qb9p-rpza-5fa5 |
|
| 29 |
| url |
VCID-qe1w-wnfu-mudr |
| vulnerability_id |
VCID-qe1w-wnfu-mudr |
| summary |
OpenStack: openstack-nova-compute console-log DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4261 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69285 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69297 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69294 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69345 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69361 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69384 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69368 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00596 |
| scoring_system |
epss |
| scoring_elements |
0.69404 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4261 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-4261
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1w-wnfu-mudr |
|
| 30 |
| url |
VCID-qfdm-g857-3yb5 |
| vulnerability_id |
VCID-qfdm-g857-3yb5 |
| summary |
OpenStack Nova can leak consoleauth token into log files
An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to `NovaProxyRequestHandlerBase.new_websocket_client` in `console/websocketproxy.py`. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-9543 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24177 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24364 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2419 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24173 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2423 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24273 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24213 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24201 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2433 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24147 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-9543 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-9543, GHSA-22jm-4hxw-35jf
|
| risk_score |
1.5 |
| exploitability |
0.5 |
| weighted_severity |
3.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qfdm-g857-3yb5 |
|
| 31 |
| url |
VCID-qnhs-qv3p-myg2 |
| vulnerability_id |
VCID-qnhs-qv3p-myg2 |
| summary |
The VMWare driver in OpenStack Compute (Nova) 2013.2 through 2013.2.2 does not properly put VMs into RESCUE status, which allows remote authenticated users to bypass the quota limit and cause a denial of service (resource consumption) by requesting the VM be put into rescue and then deleting the image. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2573 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28643 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28668 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28648 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.2874 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28736 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28698 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28632 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28826 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00106 |
| scoring_system |
epss |
| scoring_elements |
0.28696 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2573 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-2573, GHSA-jv34-xvjq-ppch, PYSEC-2014-113
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qnhs-qv3p-myg2 |
|
| 32 |
| url |
VCID-r558-z5xb-v3a8 |
| vulnerability_id |
VCID-r558-z5xb-v3a8 |
| summary |
OpenStack Nova VMware instance leak potentially leading to compute DoS
The VMware driver in OpenStack Compute (Nova) before 2014.1.4 allows remote authenticated users to cause a denial of service (disk consumption) by deleting an instance in the resize state. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8333 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72865 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72786 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72761 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.728 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72814 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72838 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72821 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72813 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72854 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72758 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00736 |
| scoring_system |
epss |
| scoring_elements |
0.72765 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8333 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-8333, GHSA-g63p-mfcm-54c4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r558-z5xb-v3a8 |
|
| 33 |
| url |
VCID-rvp9-etcr-wycj |
| vulnerability_id |
VCID-rvp9-etcr-wycj |
| summary |
OpenStack Nova DoS through ephemeral disk backing files
The libvirt driver in OpenStack Compute (Nova) before 2013.2.2 and icehouse before icehouse-2 allows remote authenticated users to cause a denial of service (disk consumption) by creating and deleting instances with unique os_type settings, which triggers the creation of a new ephemeral disk backing file. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62849 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62809 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62832 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62808 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62857 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62825 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62706 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62762 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62843 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62793 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00434 |
| scoring_system |
epss |
| scoring_elements |
0.62757 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6437 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-6437, GHSA-hrv9-4x4c-9jc8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rvp9-etcr-wycj |
|
| 34 |
| url |
VCID-s69v-tc7x-37fe |
| vulnerability_id |
VCID-s69v-tc7x-37fe |
| summary |
OpenStack Nova calls qemu-img without format restrictions for resize
An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24708 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18759 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18747 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18797 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22081 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21988 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.21907 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22132 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22017 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22058 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00072 |
| scoring_system |
epss |
| scoring_elements |
0.22043 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-24708 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-24708, GHSA-m4f3-qp2w-gwh6
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s69v-tc7x-37fe |
|
| 35 |
| url |
VCID-sj2k-uq1g-suby |
| vulnerability_id |
VCID-sj2k-uq1g-suby |
| summary |
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2013-4179 OpenStack: Nova XML entities DoS |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4179 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71365 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71309 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71322 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71345 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.7133 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71313 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71359 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71267 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71275 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00669 |
| scoring_system |
epss |
| scoring_elements |
0.71292 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4179 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-4179, GHSA-j6xh-q826-55jw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sj2k-uq1g-suby |
|
| 36 |
| url |
VCID-t2sh-b3m5-vyax |
| vulnerability_id |
VCID-t2sh-b3m5-vyax |
| summary |
OpenStack Compute (Nova) does not verify the virtual size of a QCOW2 image
OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by creating an image with a large virtual size that does not contain a large amount of data. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1918 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19277 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19413 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19179 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19258 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1931 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19315 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19267 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19213 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19171 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2096 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-2096, GHSA-m674-hmx2-ffhq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2sh-b3m5-vyax |
|
| 37 |
| url |
VCID-v47b-k4qx-h7a2 |
| vulnerability_id |
VCID-v47b-k4qx-h7a2 |
| summary |
OpenStack Nova live snapshots use an insecure local directory
OpenStack Compute (Nova) Grizzly 2013.1.4, Havana 2013.2.1, and earlier uses world-writable and world-readable permissions for the temporary directory used to store live snapshots, which allows local users to read and modify live snapshots. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17179 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1736 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17406 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17186 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17278 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17336 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17349 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17299 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1724 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17193 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7048 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-7048, GHSA-grp5-h379-j75x
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v47b-k4qx-h7a2 |
|
| 38 |
| url |
VCID-vena-h39k-v3fe |
| vulnerability_id |
VCID-vena-h39k-v3fe |
| summary |
The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver in OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, when using KVM live block migration, does not properly create all expected files, which allows attackers to obtain snapshot root disk contents of other users via ephemeral storage. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
http://osvdb.org/102416 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://osvdb.org/102416 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7130 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85482 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85458 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.8545 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.8542 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85417 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85385 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.02539 |
| scoring_system |
epss |
| scoring_elements |
0.85487 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-7130 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
| reference_url |
https://review.openstack.org/#/c/68658 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/68658 |
|
| 17 |
|
| 18 |
| reference_url |
https://review.openstack.org/#/c/68659 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/68659 |
|
| 19 |
|
| 20 |
| reference_url |
https://review.openstack.org/#/c/68660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/68660 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
| reference_url |
http://www.ubuntu.com/usn/USN-2247-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2247-1 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2013-7130, GHSA-99rx-9x8v-9j8p, PYSEC-2014-111
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vena-h39k-v3fe |
|
| 39 |
| url |
VCID-x5k4-dm9d-xkf7 |
| vulnerability_id |
VCID-x5k4-dm9d-xkf7 |
| summary |
OpenStack Compute (Nova)'s VMWare driver vulnerable to denial of service
CVE-2014-3608 openstack-nova: incomplete fix for CVE-2014-2573, Nova VMware driver still leaks rescued images |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3608 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71788 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71706 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71725 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71698 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71737 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71749 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71773 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71756 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71739 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71782 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00689 |
| scoring_system |
epss |
| scoring_elements |
0.71699 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3608 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-3608, GHSA-92hc-c226-32q7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x5k4-dm9d-xkf7 |
|
| 40 |
| url |
VCID-y8va-eyt2-3kfv |
| vulnerability_id |
VCID-y8va-eyt2-3kfv |
| summary |
OpenStack Compute (nova) Icehouse, Juno and Havana when live migration fails allows local users to access VM volumes that they would normally not have permissions for. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15948 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15831 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15817 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15892 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1596 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15998 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15958 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15872 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16075 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.16012 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2687 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/nova |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/nova |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://review.openstack.org/#/c/338929 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
6.0 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/338929 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2015-2687, GHSA-97fv-22hc-mrgj, PYSEC-2017-145
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y8va-eyt2-3kfv |
|
| 41 |
| url |
VCID-ykzj-fz7y-eug8 |
| vulnerability_id |
VCID-ykzj-fz7y-eug8 |
| summary |
Trove: potential leak of passwords into log files |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31387 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31368 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31506 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31547 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31365 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31419 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31449 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31452 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31373 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31407 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7230 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/nova@2014.1.3-11 |
| purl |
pkg:deb/debian/nova@2014.1.3-11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1fb2-ccby-7yfq |
|
| 1 |
| vulnerability |
VCID-1qbm-qguj-gkem |
|
| 2 |
| vulnerability |
VCID-2dpk-ncrc-1fcw |
|
| 3 |
| vulnerability |
VCID-5nfz-1bk3-93fe |
|
| 4 |
| vulnerability |
VCID-6n3z-x4zj-4bez |
|
| 5 |
| vulnerability |
VCID-7yp4-ebnm-g3c3 |
|
| 6 |
| vulnerability |
VCID-9se5-m6dx-8kcj |
|
| 7 |
| vulnerability |
VCID-br4q-499g-vqhg |
|
| 8 |
| vulnerability |
VCID-cwub-w9dp-wfgy |
|
| 9 |
| vulnerability |
VCID-cy7p-gzf8-eqcj |
|
| 10 |
| vulnerability |
VCID-ek6e-977t-3bew |
|
| 11 |
| vulnerability |
VCID-h6rd-5p7q-s3gq |
|
| 12 |
| vulnerability |
VCID-jdb7-71q5-pfcx |
|
| 13 |
| vulnerability |
VCID-k48d-ecqx-m3ed |
|
| 14 |
| vulnerability |
VCID-nb1y-cbzs-abhc |
|
| 15 |
| vulnerability |
VCID-qfdm-g857-3yb5 |
|
| 16 |
| vulnerability |
VCID-s69v-tc7x-37fe |
|
| 17 |
| vulnerability |
VCID-zy9m-d25c-5uga |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2014.1.3-11 |
|
|
| aliases |
CVE-2014-7230
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ykzj-fz7y-eug8 |
|
| 42 |
| url |
VCID-zy9m-d25c-5uga |
| vulnerability_id |
VCID-zy9m-d25c-5uga |
| summary |
OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption
A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87769 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87701 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87712 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87723 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87725 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87746 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87752 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87763 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87757 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87756 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.8777 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5162 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5162, GHSA-g2j5-7vgx-6xrx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zy9m-d25c-5uga |
|