Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/openstack-keystone@2013.1.3-2?arch=el6ost
Typerpm
Namespaceredhat
Nameopenstack-keystone
Version2013.1.3-2
Qualifiers
arch el6ost
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-wm8s-rmkk-mugb
vulnerability_id VCID-wm8s-rmkk-mugb
summary The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
references
0
reference_url http://osvdb.org/97237
reference_id
reference_type
scores
url http://osvdb.org/97237
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-1285.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1285.html
2
reference_url https://access.redhat.com/errata/RHSA-2013:1285
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2013:1285
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4294.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4294.json
4
reference_url https://access.redhat.com/security/cve/CVE-2013-4294
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2013-4294
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4294
reference_id
reference_type
scores
0
value 0.008
scoring_system epss
scoring_elements 0.7399
published_at 2026-04-01T12:55:00Z
1
value 0.008
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-18T12:55:00Z
2
value 0.008
scoring_system epss
scoring_elements 0.74077
published_at 2026-04-21T12:55:00Z
3
value 0.008
scoring_system epss
scoring_elements 0.74038
published_at 2026-04-13T12:55:00Z
4
value 0.008
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-12T12:55:00Z
5
value 0.008
scoring_system epss
scoring_elements 0.74064
published_at 2026-04-11T12:55:00Z
6
value 0.008
scoring_system epss
scoring_elements 0.74027
published_at 2026-04-08T12:55:00Z
7
value 0.008
scoring_system epss
scoring_elements 0.73994
published_at 2026-04-07T12:55:00Z
8
value 0.008
scoring_system epss
scoring_elements 0.74023
published_at 2026-04-04T12:55:00Z
9
value 0.008
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-02T12:55:00Z
10
value 0.008
scoring_system epss
scoring_elements 0.74042
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4294
6
reference_url https://bugs.launchpad.net/keystone/+bug/1202952
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/keystone/+bug/1202952
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1004452
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1004452
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4294
9
reference_url http://seclists.org/oss-sec/2013/q3/586
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/oss-sec/2013/q3/586
10
reference_url http://secunia.com/advisories/54706
reference_id
reference_type
scores
url http://secunia.com/advisories/54706
11
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2013-42.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2013-42.yaml
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4294
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4294
13
reference_url https://opendev.org/openstack/keystone
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/keystone
14
reference_url http://www.ubuntu.com/usn/USN-2002-1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2002-1
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722505
reference_id 722505
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722505
16
reference_url https://github.com/advisories/GHSA-5qpp-v56f-mqfm
reference_id GHSA-5qpp-v56f-mqfm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5qpp-v56f-mqfm
17
reference_url https://usn.ubuntu.com/2002-1/
reference_id USN-2002-1
reference_type
scores
url https://usn.ubuntu.com/2002-1/
fixed_packages
aliases CVE-2013-4294, GHSA-5qpp-v56f-mqfm, PYSEC-2013-42
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm8s-rmkk-mugb
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-keystone@2013.1.3-2%3Farch=el6ost