| 0 |
| url |
VCID-44u3-6h7t-dbah |
| vulnerability_id |
VCID-44u3-6h7t-dbah |
| summary |
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0105 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5896 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58819 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58894 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58935 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5894 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58959 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58941 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58957 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0105 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0105, GHSA-gwvq-rgqf-993f, PYSEC-2014-70
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-44u3-6h7t-dbah |
|
| 1 |
| url |
VCID-5atx-veu5-kud6 |
| vulnerability_id |
VCID-5atx-veu5-kud6 |
| summary |
OpenStack: Keystone disabling a tenant does not disable a user token |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4222 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68814 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68884 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68903 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68925 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68882 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68923 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68933 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4222 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4222
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5atx-veu5-kud6 |
|
| 2 |
| url |
VCID-655y-mj8k-dbb2 |
| vulnerability_id |
VCID-655y-mj8k-dbb2 |
| summary |
Keystone: trust circumvention through EC2-style tokens |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6391 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65778 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65827 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65857 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65823 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65887 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65899 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65913 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6391 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6391
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-655y-mj8k-dbb2 |
|
| 3 |
| url |
VCID-6cy4-grme-mka1 |
| vulnerability_id |
VCID-6cy4-grme-mka1 |
| summary |
OpenStack Identity Keystone Improper Privilege Management
OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same ID as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same ID. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0204 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5766 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57636 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57697 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57554 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0204 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0204, GHSA-c4p9-87h3-7vr4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6cy4-grme-mka1 |
|
| 4 |
| url |
VCID-8bat-qwmh-fyer |
| vulnerability_id |
VCID-8bat-qwmh-fyer |
| summary |
OpenStack Identity (Keystone) Denial of Service
OpenStack Identity (Keystone) before 2013.1 allows remote attackers to cause a denial of service (memory consumption and crash) via multiple long requests. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84984 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84918 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84923 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84946 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84952 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84968 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84966 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84962 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84983 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84884 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.849 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2014 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2014, GHSA-7332-36h8-8jh8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8bat-qwmh-fyer |
|
| 5 |
| url |
VCID-8tkd-pcuy-d7ax |
| vulnerability_id |
VCID-8tkd-pcuy-d7ax |
| summary |
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being invalidated by bulk token revocation and allows the trustee to bypass intended access restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40699 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40716 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40671 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4069 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40707 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40728 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40614 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2237 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2237, GHSA-23x9-8hxr-978c, PYSEC-2014-105
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8tkd-pcuy-d7ax |
|
| 6 |
| url |
VCID-91k2-z5s1-gbbx |
| vulnerability_id |
VCID-91k2-z5s1-gbbx |
| summary |
openstack-keystone: Authentication bypass when using LDAP backend |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2157 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52213 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5224 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52204 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52258 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52253 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52304 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52288 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52273 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52311 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52315 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2157 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2157
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-91k2-z5s1-gbbx |
|
| 7 |
| url |
VCID-am2m-2fgu-xkfk |
| vulnerability_id |
VCID-am2m-2fgu-xkfk |
| summary |
openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62484 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62327 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62416 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62381 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62429 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62447 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62466 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62477 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3520 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3520
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-am2m-2fgu-xkfk |
|
| 8 |
| url |
VCID-cg74-2jr1-2fhp |
| vulnerability_id |
VCID-cg74-2jr1-2fhp |
| summary |
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2059 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75707 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75709 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.7574 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75719 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75753 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.7577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75802 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2059 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2013-2059 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2013-2059 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2059, GHSA-hj89-qmx9-8qmh, PYSEC-2013-41
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg74-2jr1-2fhp |
|
| 9 |
| url |
VCID-h1xa-f7tm-tudx |
| vulnerability_id |
VCID-h1xa-f7tm-tudx |
| summary |
OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5253 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54133 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54206 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54207 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5253 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5253 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5253 |
|
| 13 |
|
| 14 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5253, GHSA-77w8-qv8m-386h, PYSEC-2014-109
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h1xa-f7tm-tudx |
|
| 10 |
| url |
VCID-hjrj-k1wk-jbha |
| vulnerability_id |
VCID-hjrj-k1wk-jbha |
| summary |
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54133 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54206 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54168 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5251 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5251 |
|
| 11 |
|
| 12 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5251, GHSA-gmvp-5rf9-mxcm, PYSEC-2014-107
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hjrj-k1wk-jbha |
|
| 11 |
| url |
VCID-ksj4-14rq-uyb7 |
| vulnerability_id |
VCID-ksj4-14rq-uyb7 |
| summary |
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining." |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2828 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75092 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75102 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75123 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75101 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75056 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75079 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.7505 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75047 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75136 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.7513 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2828 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2828, GHSA-6mv3-p2gr-wgqf, PYSEC-2014-106
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksj4-14rq-uyb7 |
|
| 12 |
| url |
VCID-my7j-6x5y-97a1 |
| vulnerability_id |
VCID-my7j-6x5y-97a1 |
| summary |
OpenStack Identity Keystone Exposure of Sensitive Information
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3621 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62296 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62253 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.6222 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.6227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62288 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62328 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62321 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62167 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62224 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3621 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3621, GHSA-8v8f-vc72-pmhc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-my7j-6x5y-97a1 |
|
| 13 |
| url |
VCID-qdd1-jvk8-73hd |
| vulnerability_id |
VCID-qdd1-jvk8-73hd |
| summary |
Permission Issues
The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4477 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3579 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35801 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35784 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35685 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35816 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35912 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4477 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4477, GHSA-f889-wfwm-6p7m
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdd1-jvk8-73hd |
|
| 14 |
| url |
VCID-qmyj-ffvg-tbe8 |
| vulnerability_id |
VCID-qmyj-ffvg-tbe8 |
| summary |
OpenStack Keystone Denial of Service vulnerability via a large HTTP request
OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0270 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82762 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85867 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85808 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85851 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85836 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0270 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0270, GHSA-4ppj-4p4v-jf4p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qmyj-ffvg-tbe8 |
|
| 15 |
| url |
VCID-s3gc-cxxf-63ed |
| vulnerability_id |
VCID-s3gc-cxxf-63ed |
| summary |
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52212 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52229 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52178 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52165 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5213 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5224 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52237 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52198 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5252 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5252 |
| reference_id |
CVE-2014-5252 |
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5252 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5252, GHSA-v8fq-gq9j-3v7h, PYSEC-2014-108
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s3gc-cxxf-63ed |
|
| 16 |
| url |
VCID-s5ab-apmg-dqd9 |
| vulnerability_id |
VCID-s5ab-apmg-dqd9 |
| summary |
OpenStack Identity Keystone is vulnerable to Block delegation escalation of privilege
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72546 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72472 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72448 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72499 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72504 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72494 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72536 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72449 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72454 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3476 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3476, GHSA-274v-r947-v34r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s5ab-apmg-dqd9 |
|
| 17 |
| url |
VCID-snpz-wwd6-dkb6 |
| vulnerability_id |
VCID-snpz-wwd6-dkb6 |
| summary |
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2006 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11843 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11788 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11758 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11876 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11922 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11854 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11653 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2006 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2006, GHSA-rxrm-xvp4-jqvh, PYSEC-2013-40
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-snpz-wwd6-dkb6 |
|
| 18 |
| url |
VCID-uexc-7rt7-hbgx |
| vulnerability_id |
VCID-uexc-7rt7-hbgx |
| summary |
OpenStack Keystone and other components vulnerable to Improper Certificate Validation
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2255 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61656 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61634 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61645 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61609 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61561 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.6159 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61661 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61487 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2255 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2255, GHSA-qh2x-hpf9-cf2g
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uexc-7rt7-hbgx |
|
| 19 |
| url |
VCID-wm8s-rmkk-mugb |
| vulnerability_id |
VCID-wm8s-rmkk-mugb |
| summary |
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4294 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.7399 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74086 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74077 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74038 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74064 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74027 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.73994 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74023 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.73997 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74042 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4294 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
http://seclists.org/oss-sec/2013/q3/586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://seclists.org/oss-sec/2013/q3/586 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://opendev.org/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://opendev.org/openstack/keystone |
|
| 14 |
| reference_url |
http://www.ubuntu.com/usn/USN-2002-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2002-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4294, GHSA-5qpp-v56f-mqfm, PYSEC-2013-42
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wm8s-rmkk-mugb |
|