Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/openstack-keystone@2012.1.2-4?arch=el6
Typerpm
Namespaceredhat
Nameopenstack-keystone
Version2012.1.2-4
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2ggr-pe4y-y3cn
vulnerability_id VCID-2ggr-pe4y-y3cn
summary OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (2012.1), allows remote attackers to add an arbitrary user to an arbitrary tenant via a request to update the user's default tenant to the administrative API. NOTE: this identifier was originally incorrectly assigned to an open redirect issue, but the correct identifier for that issue is CVE-2012-3540.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3542.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3542.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3542
reference_id
reference_type
scores
0
value 0.01949
scoring_system epss
scoring_elements 0.83406
published_at 2026-04-02T12:55:00Z
1
value 0.01949
scoring_system epss
scoring_elements 0.83495
published_at 2026-04-21T12:55:00Z
2
value 0.01949
scoring_system epss
scoring_elements 0.83494
published_at 2026-04-18T12:55:00Z
3
value 0.01949
scoring_system epss
scoring_elements 0.83492
published_at 2026-04-16T12:55:00Z
4
value 0.01949
scoring_system epss
scoring_elements 0.83457
published_at 2026-04-13T12:55:00Z
5
value 0.01949
scoring_system epss
scoring_elements 0.83461
published_at 2026-04-12T12:55:00Z
6
value 0.01949
scoring_system epss
scoring_elements 0.83467
published_at 2026-04-11T12:55:00Z
7
value 0.01949
scoring_system epss
scoring_elements 0.83453
published_at 2026-04-09T12:55:00Z
8
value 0.01949
scoring_system epss
scoring_elements 0.83443
published_at 2026-04-08T12:55:00Z
9
value 0.01949
scoring_system epss
scoring_elements 0.83419
published_at 2026-04-07T12:55:00Z
10
value 0.01949
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-04T12:55:00Z
11
value 0.01949
scoring_system epss
scoring_elements 0.83393
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3542
2
reference_url https://bugs.launchpad.net/keystone/+bug/1040626
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/keystone/+bug/1040626
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3542
4
reference_url http://secunia.com/advisories/50467
reference_id
reference_type
scores
url http://secunia.com/advisories/50467
5
reference_url http://secunia.com/advisories/50494
reference_id
reference_type
scores
url http://secunia.com/advisories/50494
6
reference_url https://github.com/openstack/keystone
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone
7
reference_url https://github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/5438d3b5a219d7c8fa67e66e538d325a61617155
8
reference_url https://github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aa
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/c13d0ba606f7b2bdc609a7f388334e5efec3f3aa
9
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2012-19.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/keystone/PYSEC-2012-19.yaml
10
reference_url https://lists.launchpad.net/openstack/msg16282.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.launchpad.net/openstack/msg16282.html
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3542
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-3542
12
reference_url https://web.archive.org/web/20121114023909/http://www.securityfocus.com/bid/55326
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20121114023909/http://www.securityfocus.com/bid/55326
13
reference_url https://web.archive.org/web/20140802052724/http://secunia.com/advisories/50467
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20140802052724/http://secunia.com/advisories/50467
14
reference_url https://web.archive.org/web/20140804204333/http://secunia.com/advisories/50494
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20140804204333/http://secunia.com/advisories/50494
15
reference_url http://www.openwall.com/lists/oss-security/2012/08/30/6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/08/30/6
16
reference_url http://www.securityfocus.com/bid/55326
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55326
17
reference_url http://www.ubuntu.com/usn/USN-1552-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1552-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=852510
reference_id 852510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=852510
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:folsom-3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:horizon:folsom-3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:folsom-3:*:*:*:*:*:*:*
21
reference_url https://github.com/advisories/GHSA-gf2q-j2qq-pjf2
reference_id GHSA-gf2q-j2qq-pjf2
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gf2q-j2qq-pjf2
22
reference_url https://usn.ubuntu.com/1552-1/
reference_id USN-1552-1
reference_type
scores
url https://usn.ubuntu.com/1552-1/
fixed_packages
aliases CVE-2012-3542, GHSA-gf2q-j2qq-pjf2, PYSEC-2012-19
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ggr-pe4y-y3cn
1
url VCID-89vf-n61h-k3b2
vulnerability_id VCID-89vf-n61h-k3b2
summary
OpenStack Keystone does not invalidate existing tokens when granting or revoking roles
OpenStack Keystone before 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.
references
0
reference_url http://github.com/openstack/keystone/commit/58ac6691a21675be9e2ffb0f84a05fc3cd4d2e2e
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://github.com/openstack/keystone/commit/58ac6691a21675be9e2ffb0f84a05fc3cd4d2e2e
1
reference_url http://osvdb.org/85484
reference_id
reference_type
scores
url http://osvdb.org/85484
2
reference_url https://access.redhat.com/errata/RHSA-2012:1378
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2012:1378
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4413.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4413.json
4
reference_url https://access.redhat.com/security/cve/CVE-2012-4413
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-4413
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4413
reference_id
reference_type
scores
0
value 0.00428
scoring_system epss
scoring_elements 0.62503
published_at 2026-04-18T12:55:00Z
1
value 0.00428
scoring_system epss
scoring_elements 0.62346
published_at 2026-04-01T12:55:00Z
2
value 0.00428
scoring_system epss
scoring_elements 0.62404
published_at 2026-04-02T12:55:00Z
3
value 0.00428
scoring_system epss
scoring_elements 0.62435
published_at 2026-04-04T12:55:00Z
4
value 0.00428
scoring_system epss
scoring_elements 0.62402
published_at 2026-04-07T12:55:00Z
5
value 0.00428
scoring_system epss
scoring_elements 0.6245
published_at 2026-04-08T12:55:00Z
6
value 0.00428
scoring_system epss
scoring_elements 0.62467
published_at 2026-04-09T12:55:00Z
7
value 0.00428
scoring_system epss
scoring_elements 0.62486
published_at 2026-04-21T12:55:00Z
8
value 0.00428
scoring_system epss
scoring_elements 0.62475
published_at 2026-04-12T12:55:00Z
9
value 0.00428
scoring_system epss
scoring_elements 0.62453
published_at 2026-04-13T12:55:00Z
10
value 0.00428
scoring_system epss
scoring_elements 0.62497
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4413
6
reference_url https://bugs.launchpad.net/keystone/+bug/1041396
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/keystone/+bug/1041396
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=855491
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=855491
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4413
9
reference_url http://secunia.com/advisories/50531
reference_id
reference_type
scores
url http://secunia.com/advisories/50531
10
reference_url http://secunia.com/advisories/50590
reference_id
reference_type
scores
url http://secunia.com/advisories/50590
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78478
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78478
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4413
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4413
13
reference_url https://opendev.org/openstack/keystone
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/keystone
14
reference_url https://review.opendev.org/c/openstack/keystone/+/12870
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://review.opendev.org/c/openstack/keystone/+/12870
15
reference_url https://review.opendev.org/c/openstack/keystone/+/12870/
reference_id
reference_type
scores
url https://review.opendev.org/c/openstack/keystone/+/12870/
16
reference_url https://web.archive.org/web/20121114023848/http://www.securityfocus.com/bid/55524
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20121114023848/http://www.securityfocus.com/bid/55524
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/12/7
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/12/7
18
reference_url http://www.securityfocus.com/bid/55524
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55524
19
reference_url http://www.ubuntu.com/usn/USN-1564-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1564-1
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687428
reference_id 687428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687428
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:keystone:2012.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.1.3:*:*:*:*:*:*:*
22
reference_url https://github.com/advisories/GHSA-mrxv-65rv-6hxq
reference_id GHSA-mrxv-65rv-6hxq
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mrxv-65rv-6hxq
23
reference_url https://usn.ubuntu.com/1564-1/
reference_id USN-1564-1
reference_type
scores
url https://usn.ubuntu.com/1564-1/
fixed_packages
aliases CVE-2012-4413, GHSA-mrxv-65rv-6hxq
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89vf-n61h-k3b2
2
url VCID-enq4-sb38-6kfz
vulnerability_id VCID-enq4-sb38-6kfz
summary
Improper Authentication
OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4457.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4457
reference_id
reference_type
scores
0
value 0.00561
scoring_system epss
scoring_elements 0.68337
published_at 2026-04-21T12:55:00Z
1
value 0.00561
scoring_system epss
scoring_elements 0.68242
published_at 2026-04-01T12:55:00Z
2
value 0.00561
scoring_system epss
scoring_elements 0.68263
published_at 2026-04-02T12:55:00Z
3
value 0.00561
scoring_system epss
scoring_elements 0.68283
published_at 2026-04-04T12:55:00Z
4
value 0.00561
scoring_system epss
scoring_elements 0.68259
published_at 2026-04-07T12:55:00Z
5
value 0.00561
scoring_system epss
scoring_elements 0.68309
published_at 2026-04-08T12:55:00Z
6
value 0.00561
scoring_system epss
scoring_elements 0.68325
published_at 2026-04-09T12:55:00Z
7
value 0.00561
scoring_system epss
scoring_elements 0.68351
published_at 2026-04-11T12:55:00Z
8
value 0.00561
scoring_system epss
scoring_elements 0.68338
published_at 2026-04-12T12:55:00Z
9
value 0.00561
scoring_system epss
scoring_elements 0.68305
published_at 2026-04-13T12:55:00Z
10
value 0.00561
scoring_system epss
scoring_elements 0.68345
published_at 2026-04-16T12:55:00Z
11
value 0.00561
scoring_system epss
scoring_elements 0.68356
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4457
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=861180
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=861180
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4457
4
reference_url http://secunia.com/advisories/50665
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/50665
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78947
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78947
6
reference_url https://github.com/openstack/keystone
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone
7
reference_url https://github.com/openstack/keystone/commit/4ebfdfaf23c6da8e3c182bf3ec2cb2b7132ef685
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/4ebfdfaf23c6da8e3c182bf3ec2cb2b7132ef685
8
reference_url https://github.com/openstack/keystone/commit/5373601bbdda10f879c08af1698852142b75f8d5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/5373601bbdda10f879c08af1698852142b75f8d5
9
reference_url https://lists.launchpad.net/openstack/msg17035.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.launchpad.net/openstack/msg17035.html
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/28/6
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/28/6
11
reference_url http://www.securityfocus.com/bid/55716
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/55716
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689210
reference_id 689210
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689210
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.2:milestone2:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:keystone:2012.2:milestone2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.2:milestone2:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4457
reference_id CVE-2012-4457
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4457
17
reference_url https://github.com/advisories/GHSA-x8h4-xf47-pqc3
reference_id GHSA-x8h4-xf47-pqc3
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x8h4-xf47-pqc3
fixed_packages
aliases CVE-2012-4457, GHSA-x8h4-xf47-pqc3
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-enq4-sb38-6kfz
3
url VCID-s84r-551v-u7b6
vulnerability_id VCID-s84r-551v-u7b6
summary
Improper Authentication
CVE-2012-4456 Openstack Keystone 2012.1.1: fails to validate tokens in Admin API
references
0
reference_url https://access.redhat.com/errata/RHSA-2012:1378
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2012:1378
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4456.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4456
reference_id
reference_type
scores
0
value 0.0395
scoring_system epss
scoring_elements 0.88368
published_at 2026-04-16T12:55:00Z
1
value 0.0395
scoring_system epss
scoring_elements 0.88353
published_at 2026-04-13T12:55:00Z
2
value 0.0395
scoring_system epss
scoring_elements 0.88361
published_at 2026-04-11T12:55:00Z
3
value 0.0395
scoring_system epss
scoring_elements 0.8835
published_at 2026-04-09T12:55:00Z
4
value 0.0395
scoring_system epss
scoring_elements 0.88305
published_at 2026-04-02T12:55:00Z
5
value 0.0395
scoring_system epss
scoring_elements 0.88297
published_at 2026-04-01T12:55:00Z
6
value 0.0395
scoring_system epss
scoring_elements 0.8832
published_at 2026-04-04T12:55:00Z
7
value 0.0395
scoring_system epss
scoring_elements 0.88344
published_at 2026-04-08T12:55:00Z
8
value 0.0395
scoring_system epss
scoring_elements 0.88325
published_at 2026-04-07T12:55:00Z
9
value 0.0395
scoring_system epss
scoring_elements 0.88364
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4456
3
reference_url https://bugs.launchpad.net/keystone/+bug/1006815
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/keystone/+bug/1006815
4
reference_url https://bugs.launchpad.net/keystone/+bug/1006822
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/keystone/+bug/1006822
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=861179
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=861179
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4456
7
reference_url http://secunia.com/advisories/50665
reference_id
reference_type
scores
url http://secunia.com/advisories/50665
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78944
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78944
9
reference_url https://github.com/openstack/keystone
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone
10
reference_url https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1
11
reference_url https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb
12
reference_url https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/24df3adb3f50cbb5ada411bc67aba8a781e6a431
13
reference_url https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/868054992faa45d6f42d822bf1588cb88d7c9ccb
14
reference_url https://lists.launchpad.net/openstack/msg17034.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.launchpad.net/openstack/msg17034.html
15
reference_url https://web.archive.org/web/20121114024512/http://www.securityfocus.com/bid/55716
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20121114024512/http://www.securityfocus.com/bid/55716
16
reference_url http://www.openwall.com/lists/oss-security/2012/09/28/5
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/28/5
17
reference_url http://www.securityfocus.com/bid/55716
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55716
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689210
reference_id 689210
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689210
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2012.2:milestone1:*:*:*:*:*:*
21
reference_url https://access.redhat.com/security/cve/CVE-2012-4456
reference_id CVE-2012-4456
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-4456
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4456
reference_id CVE-2012-4456
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4456
23
reference_url https://github.com/advisories/GHSA-mf98-r2gf-2x3w
reference_id GHSA-mf98-r2gf-2x3w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mf98-r2gf-2x3w
fixed_packages
aliases CVE-2012-4456, GHSA-mf98-r2gf-2x3w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s84r-551v-u7b6
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-keystone@2012.1.2-4%3Farch=el6