| 0 |
| url |
VCID-44u3-6h7t-dbah |
| vulnerability_id |
VCID-44u3-6h7t-dbah |
| summary |
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0105 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58939 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58819 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58894 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58935 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5894 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58959 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58941 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58957 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5896 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0105 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0105, GHSA-gwvq-rgqf-993f, PYSEC-2014-70
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-44u3-6h7t-dbah |
|
| 1 |
| url |
VCID-5atx-veu5-kud6 |
| vulnerability_id |
VCID-5atx-veu5-kud6 |
| summary |
OpenStack: Keystone disabling a tenant does not disable a user token |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4222 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68814 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68884 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68903 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68925 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68911 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68882 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68923 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68933 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4222 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4222
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5atx-veu5-kud6 |
|
| 2 |
| url |
VCID-655y-mj8k-dbb2 |
| vulnerability_id |
VCID-655y-mj8k-dbb2 |
| summary |
Keystone: trust circumvention through EC2-style tokens |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6391 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65778 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65827 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65857 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65823 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65887 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65899 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65913 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65902 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6391 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6391
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-655y-mj8k-dbb2 |
|
| 3 |
| url |
VCID-6cy4-grme-mka1 |
| vulnerability_id |
VCID-6cy4-grme-mka1 |
| summary |
OpenStack Identity Keystone Improper Privilege Management
OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same ID as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same ID. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0204 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5766 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57636 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57671 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57697 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57554 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57667 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0204 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0204, GHSA-c4p9-87h3-7vr4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6cy4-grme-mka1 |
|
| 4 |
| url |
VCID-844e-r6mn-bqh5 |
| vulnerability_id |
VCID-844e-r6mn-bqh5 |
| summary |
The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28612 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28512 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28561 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28586 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28566 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28614 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28656 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28551 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28743 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28695 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2015-7546 |
| reference_id |
CVE-2015-7546 |
| reference_type |
|
| scores |
| 0 |
| value |
6.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2015-7546 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7546, GHSA-8c4w-v65p-jvcv, PYSEC-2016-20
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-844e-r6mn-bqh5 |
|
| 5 |
| url |
VCID-8bat-qwmh-fyer |
| vulnerability_id |
VCID-8bat-qwmh-fyer |
| summary |
OpenStack Identity (Keystone) Denial of Service
OpenStack Identity (Keystone) before 2013.1 allows remote attackers to cause a denial of service (memory consumption and crash) via multiple long requests. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84981 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84923 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84946 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84952 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84968 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84966 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84962 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84983 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84984 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84884 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.849 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84918 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2014 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2014, GHSA-7332-36h8-8jh8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8bat-qwmh-fyer |
|
| 6 |
| url |
VCID-8tkd-pcuy-d7ax |
| vulnerability_id |
VCID-8tkd-pcuy-d7ax |
| summary |
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being invalidated by bulk token revocation and allows the trustee to bypass intended access restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40614 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40611 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40716 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40671 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4069 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40707 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40728 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40699 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2237 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2237, GHSA-23x9-8hxr-978c, PYSEC-2014-105
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8tkd-pcuy-d7ax |
|
| 7 |
| url |
VCID-91k2-z5s1-gbbx |
| vulnerability_id |
VCID-91k2-z5s1-gbbx |
| summary |
openstack-keystone: Authentication bypass when using LDAP backend |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2157 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52213 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5224 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52204 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52258 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52253 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52304 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52288 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52273 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52311 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52315 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52297 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2157 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2157
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-91k2-z5s1-gbbx |
|
| 8 |
| url |
VCID-96bg-ytf8-9fhd |
| vulnerability_id |
VCID-96bg-ytf8-9fhd |
| summary |
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2673 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68596 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68619 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68601 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68583 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68647 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.6868 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68689 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68676 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2673 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
http://seclists.org/oss-sec/2017/q2/125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://seclists.org/oss-sec/2017/q2/125 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
http://www.securityfocus.com/bid/98032 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.securityfocus.com/bid/98032 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2673 |
| reference_id |
CVE-2017-2673 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
7.2 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 4 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 5 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2673 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2673, GHSA-j36m-hv43-7w7m, PYSEC-2018-152
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-96bg-ytf8-9fhd |
|
| 9 |
| url |
VCID-9dhg-r711-yfg6 |
| vulnerability_id |
VCID-9dhg-r711-yfg6 |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3646 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39118 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39156 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.3921 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39226 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39238 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39201 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39182 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39207 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39029 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39214 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39236 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3646 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3646, GHSA-jwpw-ppj5-7h4w
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9dhg-r711-yfg6 |
|
| 10 |
| url |
VCID-am2m-2fgu-xkfk |
| vulnerability_id |
VCID-am2m-2fgu-xkfk |
| summary |
openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62484 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62327 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62416 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62381 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62429 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62447 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62466 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62477 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3520 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3520
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-am2m-2fgu-xkfk |
|
| 11 |
| url |
VCID-cg74-2jr1-2fhp |
| vulnerability_id |
VCID-cg74-2jr1-2fhp |
| summary |
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2059 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75791 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75707 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75709 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.7574 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75719 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75753 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.7577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75802 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75806 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2059 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2013-2059 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2013-2059 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2059, GHSA-hj89-qmx9-8qmh, PYSEC-2013-41
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg74-2jr1-2fhp |
|
| 12 |
| url |
VCID-gdk6-a746-6fac |
| vulnerability_id |
VCID-gdk6-a746-6fac |
| summary |
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.) |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72565 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72655 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72664 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72566 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72589 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72573 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72612 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72622 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72639 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72616 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72604 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19687 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://review.opendev.org/#/c/697355 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.opendev.org/#/c/697355 |
|
| 16 |
|
| 17 |
| reference_url |
https://review.opendev.org/#/c/697611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.opendev.org/#/c/697611 |
|
| 18 |
|
| 19 |
| reference_url |
https://review.opendev.org/#/c/697731 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.opendev.org/#/c/697731 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://usn.ubuntu.com/4262-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4262-1 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19687, GHSA-2j23-fwqm-mgwr, PYSEC-2019-29
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gdk6-a746-6fac |
|
| 13 |
| url |
VCID-h1xa-f7tm-tudx |
| vulnerability_id |
VCID-h1xa-f7tm-tudx |
| summary |
OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5253 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54133 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54191 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54206 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54189 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5253 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5253 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5253 |
|
| 13 |
|
| 14 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5253, GHSA-77w8-qv8m-386h, PYSEC-2014-109
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h1xa-f7tm-tudx |
|
| 14 |
| url |
VCID-hjrj-k1wk-jbha |
| vulnerability_id |
VCID-hjrj-k1wk-jbha |
| summary |
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54133 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54191 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54206 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5251 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5251 |
|
| 11 |
|
| 12 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5251, GHSA-gmvp-5rf9-mxcm, PYSEC-2014-107
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hjrj-k1wk-jbha |
|
| 15 |
| url |
VCID-ksj4-14rq-uyb7 |
| vulnerability_id |
VCID-ksj4-14rq-uyb7 |
| summary |
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining." |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2828 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.7513 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75092 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75102 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75123 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75101 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75056 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75079 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.7505 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75136 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75047 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75126 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2828 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2828, GHSA-6mv3-p2gr-wgqf, PYSEC-2014-106
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksj4-14rq-uyb7 |
|
| 16 |
| url |
VCID-my7j-6x5y-97a1 |
| vulnerability_id |
VCID-my7j-6x5y-97a1 |
| summary |
OpenStack Identity Keystone Exposure of Sensitive Information
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3621 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.6227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62313 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62328 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.6222 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62288 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62321 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62296 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62167 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62224 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62253 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3621 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3621, GHSA-8v8f-vc72-pmhc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-my7j-6x5y-97a1 |
|
| 17 |
| url |
VCID-p5un-b12x-tuh5 |
| vulnerability_id |
VCID-p5un-b12x-tuh5 |
| summary |
OpenStack Keystone allows information disclosure during account locking
OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-38155 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72775 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72874 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72882 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72872 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72855 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.7283 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72817 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72802 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72781 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-38155 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-38155, GHSA-4225-97pr-rr52
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p5un-b12x-tuh5 |
|
| 18 |
| url |
VCID-qdd1-jvk8-73hd |
| vulnerability_id |
VCID-qdd1-jvk8-73hd |
| summary |
Permission Issues
The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4477 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3574 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3579 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35801 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35816 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35784 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35685 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35912 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35743 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4477 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4477, GHSA-f889-wfwm-6p7m
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdd1-jvk8-73hd |
|
| 19 |
| url |
VCID-qmyj-ffvg-tbe8 |
| vulnerability_id |
VCID-qmyj-ffvg-tbe8 |
| summary |
OpenStack Keystone Denial of Service vulnerability via a large HTTP request
OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0270 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82762 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85859 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85867 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85808 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85851 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85836 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0270 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0270, GHSA-4ppj-4p4v-jf4p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qmyj-ffvg-tbe8 |
|
| 20 |
| url |
VCID-qyjh-md45-hyhh |
| vulnerability_id |
VCID-qyjh-md45-hyhh |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87665 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.8773 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87733 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87722 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87728 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87675 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87688 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87689 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.8771 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87717 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12691 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12691, GHSA-4427-7f3w-mqv6, PYSEC-2020-55
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qyjh-md45-hyhh |
|
| 21 |
| url |
VCID-r25g-be38-b3be |
| vulnerability_id |
VCID-r25g-be38-b3be |
| summary |
OpenStack Keystone allows /v3/ec2tokens or /v3/s3tokens request with valid AWS Signature to provide Keystone authorization.
OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65073 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07203 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07329 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07208 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15087 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15193 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14999 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15139 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15006 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15067 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15105 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65073 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-65073, GHSA-hcqg-5g63-7j9h
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r25g-be38-b3be |
|
| 22 |
| url |
VCID-rgkw-6ews-rked |
| vulnerability_id |
VCID-rgkw-6ews-rked |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12689 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77637 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77725 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77732 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77695 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77696 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77686 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77681 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77653 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77671 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77644 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12689 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12689, GHSA-chgw-36xv-47cw, PYSEC-2020-53
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgkw-6ews-rked |
|
| 23 |
| url |
VCID-s3gc-cxxf-63ed |
| vulnerability_id |
VCID-s3gc-cxxf-63ed |
| summary |
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52198 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52212 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52229 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52178 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52165 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5213 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52222 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5224 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52237 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5252 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5252 |
| reference_id |
CVE-2014-5252 |
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5252 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5252, GHSA-v8fq-gq9j-3v7h, PYSEC-2014-108
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s3gc-cxxf-63ed |
|
| 24 |
| url |
VCID-s5ab-apmg-dqd9 |
| vulnerability_id |
VCID-s5ab-apmg-dqd9 |
| summary |
OpenStack Identity Keystone is vulnerable to Block delegation escalation of privilege
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72535 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72448 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72499 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72504 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72494 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72536 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72546 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72449 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72454 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72472 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3476 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3476, GHSA-274v-r947-v34r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s5ab-apmg-dqd9 |
|
| 25 |
| url |
VCID-snpz-wwd6-dkb6 |
| vulnerability_id |
VCID-snpz-wwd6-dkb6 |
| summary |
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2006 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11773 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11758 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11876 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11922 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11843 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11854 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11788 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11653 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2006 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2006, GHSA-rxrm-xvp4-jqvh, PYSEC-2013-40
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-snpz-wwd6-dkb6 |
|
| 26 |
| url |
VCID-t2ap-zxfa-fkhe |
| vulnerability_id |
VCID-t2ap-zxfa-fkhe |
| summary |
The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) allows remote authenticated users to prevent revocation of a chain of tokens and bypass intended access restrictions by rescoping a token. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4911 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53592 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.537 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53718 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53714 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53676 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.5371 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53661 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53663 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53611 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53644 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53616 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4911 |
|
| 2 |
| reference_url |
https://bugs.launchpad.net/keystone/+bug/1577558 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://bugs.launchpad.net/keystone/+bug/1577558 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4911 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4911 |
|
| 9 |
| reference_url |
https://review.openstack.org/#/c/311886 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/311886 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4911, GHSA-f82m-w3p3-cgp3, PYSEC-2016-38
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2ap-zxfa-fkhe |
|
| 27 |
| url |
VCID-uexc-7rt7-hbgx |
| vulnerability_id |
VCID-uexc-7rt7-hbgx |
| summary |
OpenStack Keystone and other components vulnerable to Improper Certificate Validation
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2255 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61656 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61634 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61645 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61609 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61561 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.6159 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61661 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61487 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2255 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2255, GHSA-qh2x-hpf9-cf2g
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uexc-7rt7-hbgx |
|
| 28 |
| url |
VCID-w6e4-zd31-g7hu |
| vulnerability_id |
VCID-w6e4-zd31-g7hu |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74373 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.7438 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74372 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74288 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74335 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74343 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74363 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74342 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74327 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74294 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74321 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74293 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12690 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12690, GHSA-6m8p-x4qw-gh5j, PYSEC-2020-54
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w6e4-zd31-g7hu |
|
| 29 |
| url |
VCID-wc5s-25xb-rqaa |
| vulnerability_id |
VCID-wc5s-25xb-rqaa |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12692 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34158 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34194 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34207 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.33931 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34174 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34197 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34238 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34209 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34166 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34303 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.3427 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12692 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12692, GHSA-rqw2-hhrf-7936, PYSEC-2020-56
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wc5s-25xb-rqaa |
|
| 30 |
| url |
VCID-wm8s-rmkk-mugb |
| vulnerability_id |
VCID-wm8s-rmkk-mugb |
| summary |
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4294 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.7399 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74086 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74077 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74038 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74064 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74027 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.73994 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74023 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.73997 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74042 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4294 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
http://seclists.org/oss-sec/2013/q3/586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://seclists.org/oss-sec/2013/q3/586 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://opendev.org/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://opendev.org/openstack/keystone |
|
| 14 |
| reference_url |
http://www.ubuntu.com/usn/USN-2002-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2002-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4294, GHSA-5qpp-v56f-mqfm, PYSEC-2013-42
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wm8s-rmkk-mugb |
|
| 31 |
| url |
VCID-ztee-sxym-zffv |
| vulnerability_id |
VCID-ztee-sxym-zffv |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78351 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78357 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78398 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.7843 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78412 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78405 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78434 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78432 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78428 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14432 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14432
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ztee-sxym-zffv |
|