| 0 |
| url |
VCID-2ggr-pe4y-y3cn |
| vulnerability_id |
VCID-2ggr-pe4y-y3cn |
| summary |
OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3542 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83406 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83494 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83492 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83457 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83461 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83467 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83453 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83443 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83419 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.8342 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01949 |
| scoring_system |
epss |
| scoring_elements |
0.83393 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3542 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2012-3542 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2012-3542 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
http://www.ubuntu.com/usn/USN-1552-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-1552-1 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3542, GHSA-gf2q-j2qq-pjf2, PYSEC-2012-19
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2ggr-pe4y-y3cn |
|
| 1 |
| url |
VCID-44u3-6h7t-dbah |
| vulnerability_id |
VCID-44u3-6h7t-dbah |
| summary |
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached." |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0105 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5896 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58819 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58894 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58935 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.5894 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58959 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58941 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00371 |
| scoring_system |
epss |
| scoring_elements |
0.58957 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0105 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0105, GHSA-gwvq-rgqf-993f, PYSEC-2014-70
|
| risk_score |
2.7 |
| exploitability |
0.5 |
| weighted_severity |
5.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-44u3-6h7t-dbah |
|
| 2 |
| url |
VCID-5atx-veu5-kud6 |
| vulnerability_id |
VCID-5atx-veu5-kud6 |
| summary |
OpenStack: Keystone disabling a tenant does not disable a user token |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4222 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68814 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68884 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68903 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68925 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68882 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68923 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68933 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4222 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4222
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5atx-veu5-kud6 |
|
| 3 |
| url |
VCID-655y-mj8k-dbb2 |
| vulnerability_id |
VCID-655y-mj8k-dbb2 |
| summary |
Keystone: trust circumvention through EC2-style tokens |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6391 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65778 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65827 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65857 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65823 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65875 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65887 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65906 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65893 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65899 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00498 |
| scoring_system |
epss |
| scoring_elements |
0.65913 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6391 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6391
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-655y-mj8k-dbb2 |
|
| 4 |
| url |
VCID-6cy4-grme-mka1 |
| vulnerability_id |
VCID-6cy4-grme-mka1 |
| summary |
OpenStack Identity Keystone Improper Privilege Management
OpenStack Identity (Keystone) before 2014.1.1 does not properly handle when a role is assigned to a group that has the same ID as a user, which allows remote authenticated users to gain privileges that are assigned to a group with the same ID. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0204 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57708 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5766 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57636 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57697 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57667 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57554 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0204 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0204, GHSA-c4p9-87h3-7vr4
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6cy4-grme-mka1 |
|
| 5 |
| url |
VCID-6fhd-mggs-j3c9 |
| vulnerability_id |
VCID-6fhd-mggs-j3c9 |
| summary |
OpenStack: Keystone /etc/keystone/ec2rc secret key exposure |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5483 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29429 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.2949 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29559 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29607 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29428 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29491 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.2953 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29534 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29489 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29437 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00111 |
| scoring_system |
epss |
| scoring_elements |
0.29458 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5483 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5483
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6fhd-mggs-j3c9 |
|
| 6 |
| url |
VCID-6ku1-bgjj-2yg6 |
| vulnerability_id |
VCID-6ku1-bgjj-2yg6 |
| summary |
OpenStack Keystone allows context-dependent attackers to bypass access restrictions
OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0282 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64469 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64343 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64397 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64426 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64386 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64435 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.6445 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64463 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64451 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64422 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64457 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0282 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0282, GHSA-8833-qrvm-wc3h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ku1-bgjj-2yg6 |
|
| 7 |
|
| 8 |
| url |
VCID-7rg3-te3d-3qa9 |
| vulnerability_id |
VCID-7rg3-te3d-3qa9 |
| summary |
openstack-keystone: Insecure management of LDAP and admin_token configuration file values |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1977 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30011 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30111 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30148 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30009 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30069 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30105 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30109 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30066 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30016 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00114 |
| scoring_system |
epss |
| scoring_elements |
0.30031 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1977 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1977
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7rg3-te3d-3qa9 |
|
| 9 |
| url |
VCID-844e-r6mn-bqh5 |
| vulnerability_id |
VCID-844e-r6mn-bqh5 |
| summary |
The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28612 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28561 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28586 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28566 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28614 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28656 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28616 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28551 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28743 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28695 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-7546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2015-7546 |
| reference_id |
CVE-2015-7546 |
| reference_type |
|
| scores |
| 0 |
| value |
6.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2015-7546 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-7546, GHSA-8c4w-v65p-jvcv, PYSEC-2016-20
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-844e-r6mn-bqh5 |
|
| 10 |
| url |
VCID-89vf-n61h-k3b2 |
| vulnerability_id |
VCID-89vf-n61h-k3b2 |
| summary |
OpenStack Keystone does not invalidate existing tokens when granting or revoking roles
OpenStack Keystone before 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4413 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62503 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62346 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62404 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62435 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62402 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.6245 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62467 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62486 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62475 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62453 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62497 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4413 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-4413, GHSA-mrxv-65rv-6hxq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-89vf-n61h-k3b2 |
|
| 11 |
| url |
VCID-8bat-qwmh-fyer |
| vulnerability_id |
VCID-8bat-qwmh-fyer |
| summary |
OpenStack Identity (Keystone) Denial of Service
OpenStack Identity (Keystone) before 2013.1 allows remote attackers to cause a denial of service (memory consumption and crash) via multiple long requests. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84984 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84918 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84923 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84946 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84952 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84968 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84966 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84962 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84983 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.84884 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.02372 |
| scoring_system |
epss |
| scoring_elements |
0.849 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2014 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2014, GHSA-7332-36h8-8jh8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8bat-qwmh-fyer |
|
| 12 |
| url |
VCID-8tkd-pcuy-d7ax |
| vulnerability_id |
VCID-8tkd-pcuy-d7ax |
| summary |
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being invalidated by bulk token revocation and allows the trustee to bypass intended access restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40699 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40716 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40671 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.4069 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40707 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40701 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40651 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40728 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00188 |
| scoring_system |
epss |
| scoring_elements |
0.40614 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2237 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2237, GHSA-23x9-8hxr-978c, PYSEC-2014-105
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8tkd-pcuy-d7ax |
|
| 13 |
| url |
VCID-8yfq-hpqh-zqcp |
| vulnerability_id |
VCID-8yfq-hpqh-zqcp |
| summary |
XML External Entity (XXE) in Django
The XML libraries for Python as used in OpenStack Keystone Essex and Folsom, Django, and possibly other products allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1665 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86576 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86495 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86505 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86524 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86523 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86543 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86553 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86567 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86564 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86557 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.02995 |
| scoring_system |
epss |
| scoring_elements |
0.86572 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1665 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1665, GHSA-x64m-686f-fmm3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8yfq-hpqh-zqcp |
|
| 14 |
| url |
VCID-91k2-z5s1-gbbx |
| vulnerability_id |
VCID-91k2-z5s1-gbbx |
| summary |
openstack-keystone: Authentication bypass when using LDAP backend |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2157 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5217 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52213 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5224 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52204 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52258 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52253 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52304 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52288 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52273 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52311 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52315 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2157 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2157
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-91k2-z5s1-gbbx |
|
| 15 |
| url |
VCID-93vc-hgec-nfe6 |
| vulnerability_id |
VCID-93vc-hgec-nfe6 |
| summary |
Openstack Keystone Incorrect Authorization vulnerability
A flaw was found in openstack-keystone, only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity. A [patch](https://opendev.org/openstack/keystone/commit/7859ed26003858ebfd9a5e866b43f1a6a9e83dca) is available. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3563 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17638 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17593 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17735 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17717 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17656 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17566 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17866 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17812 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1765 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17584 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3563 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3563, GHSA-cc99-whm5-mmq3
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-93vc-hgec-nfe6 |
|
| 16 |
| url |
VCID-96bg-ytf8-9fhd |
| vulnerability_id |
VCID-96bg-ytf8-9fhd |
| summary |
An authorization-check flaw was discovered in federation configurations of the OpenStack Identity service (keystone). An authenticated federated user could request permissions to a project and unintentionally be granted all related roles including administrative roles. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2673 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68619 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68601 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68583 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68689 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.687 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68647 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00572 |
| scoring_system |
epss |
| scoring_elements |
0.68596 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2673 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
http://seclists.org/oss-sec/2017/q2/125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://seclists.org/oss-sec/2017/q2/125 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
http://www.securityfocus.com/bid/98032 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.securityfocus.com/bid/98032 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2673 |
| reference_id |
CVE-2017-2673 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
6.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
7.2 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 4 |
| value |
8.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 5 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-2673 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2673, GHSA-j36m-hv43-7w7m, PYSEC-2018-152
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-96bg-ytf8-9fhd |
|
| 17 |
| url |
VCID-9dhg-r711-yfg6 |
| vulnerability_id |
VCID-9dhg-r711-yfg6 |
| summary |
Exposure of Sensitive Information to an Unauthorized Actor
OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3646 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39207 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39236 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39156 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.3921 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39226 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39238 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39201 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39182 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39029 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00177 |
| scoring_system |
epss |
| scoring_elements |
0.39214 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3646 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3646, GHSA-jwpw-ppj5-7h4w
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9dhg-r711-yfg6 |
|
| 18 |
| url |
VCID-am2m-2fgu-xkfk |
| vulnerability_id |
VCID-am2m-2fgu-xkfk |
| summary |
openstack-keystone: Keystone V2 trusts privilege escalation through user supplied project id |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62484 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62327 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62385 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62416 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62381 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62429 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62447 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62466 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00428 |
| scoring_system |
epss |
| scoring_elements |
0.62477 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3520 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3520
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-am2m-2fgu-xkfk |
|
| 19 |
| url |
VCID-cg74-2jr1-2fhp |
| vulnerability_id |
VCID-cg74-2jr1-2fhp |
| summary |
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2059 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75806 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75707 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75709 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.7574 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75719 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75753 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75764 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75789 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.7577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00908 |
| scoring_system |
epss |
| scoring_elements |
0.75802 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2059 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2013-2059 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2013-2059 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2059, GHSA-hj89-qmx9-8qmh, PYSEC-2013-41
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg74-2jr1-2fhp |
|
| 20 |
| url |
VCID-cm7y-v3wx-ekf2 |
| vulnerability_id |
VCID-cm7y-v3wx-ekf2 |
| summary |
Keystone: denial of service through invalid token requests |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0247 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86502 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86416 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86427 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86447 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86475 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86491 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86488 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0296 |
| scoring_system |
epss |
| scoring_elements |
0.86497 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0247 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0247
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cm7y-v3wx-ekf2 |
|
| 21 |
| url |
VCID-enq4-sb38-6kfz |
| vulnerability_id |
VCID-enq4-sb38-6kfz |
| summary |
Improper Authentication
OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4457 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68259 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68356 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68345 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68305 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68242 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68309 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68263 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68283 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68338 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68351 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68325 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4457 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-4457, GHSA-x8h4-xf47-pqc3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-enq4-sb38-6kfz |
|
| 22 |
| url |
VCID-gdk6-a746-6fac |
| vulnerability_id |
VCID-gdk6-a746-6fac |
| summary |
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials API. Any user with a role on a project is able to list any credentials with the /v3/credentials API when enforce_scope is false. Users with a role on a project are able to view any other users' credentials, which could (for example) leak sign-on information for Time-based One Time Passwords (TOTP). Deployments with enforce_scope set to false are affected. (There will be a slight performance impact for the list credentials API once this issue is fixed.) |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19687 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72565 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72664 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72612 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72566 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72589 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72573 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72622 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72639 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72616 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00728 |
| scoring_system |
epss |
| scoring_elements |
0.72604 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-19687 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://review.opendev.org/#/c/697355 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.opendev.org/#/c/697355 |
|
| 16 |
|
| 17 |
| reference_url |
https://review.opendev.org/#/c/697611 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.opendev.org/#/c/697611 |
|
| 18 |
|
| 19 |
| reference_url |
https://review.opendev.org/#/c/697731 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.opendev.org/#/c/697731 |
|
| 20 |
|
| 21 |
|
| 22 |
| reference_url |
https://usn.ubuntu.com/4262-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4262-1 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-19687, GHSA-2j23-fwqm-mgwr, PYSEC-2019-29
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gdk6-a746-6fac |
|
| 23 |
| url |
VCID-ggce-w4cy-wfc3 |
| vulnerability_id |
VCID-ggce-w4cy-wfc3 |
| summary |
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1572 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61766 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.6176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61591 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61665 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61696 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61666 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61715 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.6173 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61752 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.61739 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00416 |
| scoring_system |
epss |
| scoring_elements |
0.6172 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1572 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1572
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ggce-w4cy-wfc3 |
|
| 24 |
| url |
VCID-h1xa-f7tm-tudx |
| vulnerability_id |
VCID-h1xa-f7tm-tudx |
| summary |
OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5253 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54133 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54206 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54168 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54207 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5253 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5253 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5253 |
|
| 13 |
|
| 14 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5253, GHSA-77w8-qv8m-386h, PYSEC-2014-109
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h1xa-f7tm-tudx |
|
| 25 |
| url |
VCID-hjrj-k1wk-jbha |
| vulnerability_id |
VCID-hjrj-k1wk-jbha |
| summary |
The MySQL token driver in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 stores timestamps with the incorrect precision, which causes the expiration comparison for tokens to fail and allows remote authenticated users to retain access via an expired token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54207 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54157 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54133 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54108 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.5421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54206 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54168 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5251 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5251 |
|
| 11 |
|
| 12 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5251, GHSA-gmvp-5rf9-mxcm, PYSEC-2014-107
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hjrj-k1wk-jbha |
|
| 26 |
| url |
VCID-ksj4-14rq-uyb7 |
| vulnerability_id |
VCID-ksj4-14rq-uyb7 |
| summary |
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining." |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2828 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75092 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75102 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75123 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75101 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75056 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75079 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.7505 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75047 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.75136 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00864 |
| scoring_system |
epss |
| scoring_elements |
0.7513 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2828 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2828, GHSA-6mv3-p2gr-wgqf, PYSEC-2014-106
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksj4-14rq-uyb7 |
|
| 27 |
| url |
VCID-my7j-6x5y-97a1 |
| vulnerability_id |
VCID-my7j-6x5y-97a1 |
| summary |
OpenStack Identity Keystone Exposure of Sensitive Information
The catalog url replacement in OpenStack Identity (Keystone) before 2013.2.3 and 2014.1 before 2014.1.2.1 allows remote authenticated users to read sensitive configuration options via a crafted endpoint, as demonstrated by "$(admin_token)" in the publicurl endpoint field. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3621 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62296 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62253 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.6222 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.6227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62288 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62275 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62328 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62321 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62167 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62224 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3621 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3621, GHSA-8v8f-vc72-pmhc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-my7j-6x5y-97a1 |
|
| 28 |
| url |
VCID-p5un-b12x-tuh5 |
| vulnerability_id |
VCID-p5un-b12x-tuh5 |
| summary |
OpenStack Keystone allows information disclosure during account locking
OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-38155 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72775 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72882 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72872 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72855 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.7283 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72817 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72779 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72802 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00737 |
| scoring_system |
epss |
| scoring_elements |
0.72781 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-38155 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-38155, GHSA-4225-97pr-rr52
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p5un-b12x-tuh5 |
|
| 29 |
| url |
VCID-p776-3n3m-wkhz |
| vulnerability_id |
VCID-p776-3n3m-wkhz |
| summary |
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2104 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73448 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73476 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73453 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73445 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73548 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73495 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73502 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73498 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00769 |
| scoring_system |
epss |
| scoring_elements |
0.73538 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2104 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
http://www.ubuntu.com/usn/USN-1851-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-1851-1 |
|
| 14 |
| reference_url |
http://www.ubuntu.com/usn/USN-1875-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-1875-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2104, GHSA-4rrr-j7ff-r844, PYSEC-2014-69
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p776-3n3m-wkhz |
|
| 30 |
| url |
VCID-qdd1-jvk8-73hd |
| vulnerability_id |
VCID-qdd1-jvk8-73hd |
| summary |
Permission Issues
The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4477 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.3579 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35801 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35761 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35784 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35685 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35816 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00151 |
| scoring_system |
epss |
| scoring_elements |
0.35912 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4477 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4477, GHSA-f889-wfwm-6p7m
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdd1-jvk8-73hd |
|
| 31 |
| url |
VCID-qmyj-ffvg-tbe8 |
| vulnerability_id |
VCID-qmyj-ffvg-tbe8 |
| summary |
OpenStack Keystone Denial of Service vulnerability via a large HTTP request
OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0270 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82778 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82762 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01809 |
| scoring_system |
epss |
| scoring_elements |
0.82792 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85848 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85867 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85862 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85808 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85851 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.02681 |
| scoring_system |
epss |
| scoring_elements |
0.85836 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0270 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0270, GHSA-4ppj-4p4v-jf4p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qmyj-ffvg-tbe8 |
|
| 32 |
| url |
VCID-qtvd-85ab-tygr |
| vulnerability_id |
VCID-qtvd-85ab-tygr |
| summary |
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5563 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.6019 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60208 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60221 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60186 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60136 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.6023 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60141 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60064 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60237 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5563 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2012-5563 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2012-5563 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
| reference_url |
http://www.ubuntu.com/usn/USN-1641-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
8.2 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-1641-1 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5563, GHSA-w66p-78g4-mr7g, PYSEC-2012-20
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qtvd-85ab-tygr |
|
| 33 |
| url |
VCID-qyjh-md45-hyhh |
| vulnerability_id |
VCID-qyjh-md45-hyhh |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87665 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87722 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87728 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87717 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.8771 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87689 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87688 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87675 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87733 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.03566 |
| scoring_system |
epss |
| scoring_elements |
0.87719 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12691 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12691, GHSA-4427-7f3w-mqv6, PYSEC-2020-55
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qyjh-md45-hyhh |
|
| 34 |
| url |
VCID-r25g-be38-b3be |
| vulnerability_id |
VCID-r25g-be38-b3be |
| summary |
OpenStack Keystone allows /v3/ec2tokens or /v3/s3tokens request with valid AWS Signature to provide Keystone authorization.
OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65073 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07203 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07208 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15193 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.14999 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15087 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15139 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15105 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15067 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15006 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-65073 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-65073, GHSA-hcqg-5g63-7j9h
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r25g-be38-b3be |
|
| 35 |
| url |
VCID-rgkw-6ews-rked |
| vulnerability_id |
VCID-rgkw-6ews-rked |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12689 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77637 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77731 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77732 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77695 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77696 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77686 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77681 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77653 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77671 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01066 |
| scoring_system |
epss |
| scoring_elements |
0.77644 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12689 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12689, GHSA-chgw-36xv-47cw, PYSEC-2020-53
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgkw-6ews-rked |
|
| 36 |
| url |
VCID-s3gc-cxxf-63ed |
| vulnerability_id |
VCID-s3gc-cxxf-63ed |
| summary |
The V3 API in OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 updates the issued_at value for UUID v2 tokens, which allows remote authenticated users to bypass the token expiration and retain access via a verification (1) GET or (2) HEAD request to v3/auth/tokens/. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52212 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52229 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52178 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52182 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52165 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5213 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52138 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.5224 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52237 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00287 |
| scoring_system |
epss |
| scoring_elements |
0.52198 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5252 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
http://www.ubuntu.com/usn/USN-2324-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2324-1 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5252 |
| reference_id |
CVE-2014-5252 |
| reference_type |
|
| scores |
| 0 |
| value |
4.9 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:P/A:N |
|
| 1 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2014-5252 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5252, GHSA-v8fq-gq9j-3v7h, PYSEC-2014-108
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s3gc-cxxf-63ed |
|
| 37 |
| url |
VCID-s5ab-apmg-dqd9 |
| vulnerability_id |
VCID-s5ab-apmg-dqd9 |
| summary |
OpenStack Identity Keystone is vulnerable to Block delegation escalation of privilege
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72546 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72472 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72448 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72499 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72504 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72494 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72536 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72449 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00721 |
| scoring_system |
epss |
| scoring_elements |
0.72454 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3476 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3476, GHSA-274v-r947-v34r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s5ab-apmg-dqd9 |
|
| 38 |
| url |
VCID-s62y-6nw4-j7gt |
| vulnerability_id |
VCID-s62y-6nw4-j7gt |
| summary |
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1865 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78629 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78553 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78559 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78591 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78572 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78598 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78604 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78628 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.7861 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78602 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01162 |
| scoring_system |
epss |
| scoring_elements |
0.78631 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1865 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://opendev.org/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://opendev.org/openstack/keystone |
|
| 13 |
| reference_url |
https://review.openstack.org/24906 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/24906 |
|
| 14 |
| reference_url |
https://review.openstack.org/#/c/24906 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/24906 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
http://www.ubuntu.com/usn/USN-1772-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-1772-1 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2013-1865 |
| reference_id |
CVE-2013-1865 |
| reference_type |
|
| scores |
| 0 |
| value |
6.8 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2013-1865 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1865, GHSA-22q6-wwq7-2jj9, PYSEC-2013-39
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s62y-6nw4-j7gt |
|
| 39 |
| url |
VCID-s84r-551v-u7b6 |
| vulnerability_id |
VCID-s84r-551v-u7b6 |
| summary |
Improper Authentication
CVE-2012-4456 Openstack Keystone 2012.1.1: fails to validate tokens in Admin API |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4456 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88368 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88353 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88361 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.8835 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88305 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88297 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.8832 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88344 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88325 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0395 |
| scoring_system |
epss |
| scoring_elements |
0.88364 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4456 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-4456, GHSA-mf98-r2gf-2x3w
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s84r-551v-u7b6 |
|
| 40 |
| url |
VCID-snpz-wwd6-dkb6 |
| vulnerability_id |
VCID-snpz-wwd6-dkb6 |
| summary |
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2006 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11843 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11788 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11758 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11876 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11922 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11707 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11854 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11653 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2006 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2006, GHSA-rxrm-xvp4-jqvh, PYSEC-2013-40
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-snpz-wwd6-dkb6 |
|
| 41 |
| url |
VCID-swvg-7jxy-p3cg |
| vulnerability_id |
VCID-swvg-7jxy-p3cg |
| summary |
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3426 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.6836 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68244 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68265 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68285 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68261 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68312 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68328 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68354 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68342 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68309 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00561 |
| scoring_system |
epss |
| scoring_elements |
0.68349 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-3426 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-3426, GHSA-xp97-6w7r-4cjc, PYSEC-2012-34
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-swvg-7jxy-p3cg |
|
| 42 |
| url |
VCID-t2ap-zxfa-fkhe |
| vulnerability_id |
VCID-t2ap-zxfa-fkhe |
| summary |
The Fernet Token Provider in OpenStack Identity (Keystone) 9.0.x before 9.0.1 (mitaka) allows remote authenticated users to prevent revocation of a chain of tokens and bypass intended access restrictions by rescoping a token. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4911 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53616 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53718 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53714 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53676 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53592 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53611 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53644 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.5371 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53661 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00304 |
| scoring_system |
epss |
| scoring_elements |
0.53663 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4911 |
|
| 2 |
| reference_url |
https://bugs.launchpad.net/keystone/+bug/1577558 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://bugs.launchpad.net/keystone/+bug/1577558 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4911 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 4 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4911 |
|
| 9 |
| reference_url |
https://review.openstack.org/#/c/311886 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://review.openstack.org/#/c/311886 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4911, GHSA-f82m-w3p3-cgp3, PYSEC-2016-38
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t2ap-zxfa-fkhe |
|
| 43 |
| url |
VCID-t88t-p8tx-cfcu |
| vulnerability_id |
VCID-t88t-p8tx-cfcu |
| summary |
Multiple vulnerabilities have been found in libxml2, allowing
remote attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88332 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88312 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88285 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88293 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88308 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88349 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88353 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.8834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88348 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.03938 |
| scoring_system |
epss |
| scoring_elements |
0.88338 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1664 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1664, GHSA-qrh7-x6fp-c2mp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t88t-p8tx-cfcu |
|
| 44 |
| url |
VCID-uexc-7rt7-hbgx |
| vulnerability_id |
VCID-uexc-7rt7-hbgx |
| summary |
OpenStack Keystone and other components vulnerable to Improper Certificate Validation
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2255 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61656 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61634 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61645 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61609 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61561 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.6159 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61661 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00414 |
| scoring_system |
epss |
| scoring_elements |
0.61487 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2255 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2255, GHSA-qh2x-hpf9-cf2g
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uexc-7rt7-hbgx |
|
| 45 |
| url |
VCID-vr8z-xkg6-kuhy |
| vulnerability_id |
VCID-vr8z-xkg6-kuhy |
| summary |
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5571 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35928 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35885 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35902 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35965 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35959 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35942 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35935 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38622 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.00173 |
| scoring_system |
epss |
| scoring_elements |
0.38753 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5571 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5571, GHSA-qvpr-qm6w-6rcc, PYSEC-2012-35
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vr8z-xkg6-kuhy |
|
| 46 |
| url |
VCID-w6e4-zd31-g7hu |
| vulnerability_id |
VCID-w6e4-zd31-g7hu |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12690 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.7438 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74372 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74335 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74288 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74343 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74363 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74342 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74327 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74294 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74321 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00817 |
| scoring_system |
epss |
| scoring_elements |
0.74293 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12690 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12690, GHSA-6m8p-x4qw-gh5j, PYSEC-2020-54
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w6e4-zd31-g7hu |
|
| 47 |
| url |
VCID-wc5s-25xb-rqaa |
| vulnerability_id |
VCID-wc5s-25xb-rqaa |
| summary |
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12692 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34194 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34207 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34174 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.33931 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34197 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34238 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34209 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34166 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.34303 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0014 |
| scoring_system |
epss |
| scoring_elements |
0.3427 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12692 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/keystone |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://usn.ubuntu.com/4480-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4480-1 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12692, GHSA-rqw2-hhrf-7936, PYSEC-2020-56
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wc5s-25xb-rqaa |
|
| 48 |
| url |
VCID-wm8s-rmkk-mugb |
| vulnerability_id |
VCID-wm8s-rmkk-mugb |
| summary |
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4294 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.7399 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74086 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74077 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74038 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74064 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74027 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.73994 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74023 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.73997 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.008 |
| scoring_system |
epss |
| scoring_elements |
0.74042 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4294 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
http://seclists.org/oss-sec/2013/q3/586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://seclists.org/oss-sec/2013/q3/586 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://opendev.org/openstack/keystone |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://opendev.org/openstack/keystone |
|
| 14 |
| reference_url |
http://www.ubuntu.com/usn/USN-2002-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
http://www.ubuntu.com/usn/USN-2002-1 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4294, GHSA-5qpp-v56f-mqfm, PYSEC-2013-42
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wm8s-rmkk-mugb |
|
| 49 |
| url |
VCID-ztee-sxym-zffv |
| vulnerability_id |
VCID-ztee-sxym-zffv |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78351 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78357 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78398 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.7843 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78412 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78405 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78434 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01139 |
| scoring_system |
epss |
| scoring_elements |
0.78432 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14432 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14432
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ztee-sxym-zffv |
|