| 0 |
| url |
VCID-4gfp-cgn8-mygq |
| vulnerability_id |
VCID-4gfp-cgn8-mygq |
| summary |
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9684 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68931 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68908 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.6889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.6884 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.6886 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68839 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68821 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68929 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68939 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9684 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/glance |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/glance |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9684, GHSA-h737-q6g6-8wr6, PYSEC-2015-37
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4gfp-cgn8-mygq |
|
| 1 |
| url |
VCID-9sg5-tbvn-syba |
| vulnerability_id |
VCID-9sg5-tbvn-syba |
| summary |
OpenStack Image Service (Glance) allows remote authenticated users to bypass storage quota, cause denial of service
OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9623. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5286 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55728 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55677 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55698 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55731 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55747 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55743 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55703 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.55565 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00328 |
| scoring_system |
epss |
| scoring_elements |
0.5574 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5286 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5286, GHSA-gvjg-r9fv-7qx9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9sg5-tbvn-syba |
|
| 2 |
| url |
VCID-9zm2-a38f-33g3 |
| vulnerability_id |
VCID-9zm2-a38f-33g3 |
| summary |
Improper Access Control
When the `download_image` policy is configured, does not properly restrict access to cached images, which allows remote authenticated users to read otherwise restricted images via an image UUID. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4428 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52673 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52718 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.5271 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52761 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52807 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.5279 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52774 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52811 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00295 |
| scoring_system |
epss |
| scoring_elements |
0.52818 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4428 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4428
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9zm2-a38f-33g3 |
|
| 3 |
| url |
VCID-amnu-d5wp-jqb6 |
| vulnerability_id |
VCID-amnu-d5wp-jqb6 |
| summary |
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1881 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68939 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68821 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68839 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.6886 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.6884 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.6889 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68908 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68931 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0058 |
| scoring_system |
epss |
| scoring_elements |
0.68929 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1881 |
|
| 4 |
|
| 5 |
| reference_url |
https://github.com/openstack/glance |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/glance |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1881, GHSA-4jp4-3c62-r8jv, PYSEC-2015-38
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-amnu-d5wp-jqb6 |
|
| 4 |
| url |
VCID-br4q-499g-vqhg |
| vulnerability_id |
VCID-br4q-499g-vqhg |
| summary |
OpenStack Cinder, glance, and Nova vulnerable to Path Traversal
An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47951 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72732 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72721 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72679 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72706 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72682 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72669 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.7263 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72653 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00731 |
| scoring_system |
epss |
| scoring_elements |
0.72635 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-47951 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://launchpad.net/bugs/1996188 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-31T16:49:04Z/ |
|
|
| url |
https://launchpad.net/bugs/1996188 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-47951, GHSA-7h75-hwxx-qpgc
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-br4q-499g-vqhg |
|
| 5 |
| url |
VCID-fh42-vdj2-dqgu |
| vulnerability_id |
VCID-fh42-vdj2-dqgu |
| summary |
OpenStack Glance Bypass the storage quota and Denial of service
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting an image in the saving state. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57703 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57722 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57743 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57696 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57729 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57733 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57725 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5759 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57675 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57671 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9623 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9623, GHSA-j4mh-9wq6-8rg6
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fh42-vdj2-dqgu |
|
| 6 |
| url |
VCID-fwaa-nnw4-1qcz |
| vulnerability_id |
VCID-fwaa-nnw4-1qcz |
| summary |
openstack-glance: unrestricted path traversal flaw |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9493 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73188 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73093 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73114 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73088 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73124 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73138 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73162 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73142 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73136 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0075 |
| scoring_system |
epss |
| scoring_elements |
0.73179 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-9493 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-9493
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fwaa-nnw4-1qcz |
|
| 7 |
| url |
VCID-g1mf-hrds-bubz |
| vulnerability_id |
VCID-g1mf-hrds-bubz |
| summary |
OpenStack Image Service (Glance) vulnerable to Improper Access Control
OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0757 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36287 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36298 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36254 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36279 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36316 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.3631 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36176 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36371 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36403 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36238 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00155 |
| scoring_system |
epss |
| scoring_elements |
0.36282 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0757 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-0757 |
| reference_id |
CVE-2016-0757 |
| reference_type |
|
| scores |
| 0 |
| value |
4.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:N/I:P/A:N |
|
| 1 |
| value |
4.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 2 |
| value |
4.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-0757 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-0757, GHSA-5xrj-ghhp-hx7p
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g1mf-hrds-bubz |
|
| 8 |
| url |
VCID-h6rd-5p7q-s3gq |
| vulnerability_id |
VCID-h6rd-5p7q-s3gq |
| summary |
OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access
An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32498 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38394 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38413 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38465 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38489 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38353 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38404 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38412 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38391 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-32498 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://launchpad.net/bugs/2059809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T15:32:53Z/ |
|
|
| url |
https://launchpad.net/bugs/2059809 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
| reference_url |
https://security.openstack.org/ossa/OSSA-2024-001.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-16T15:32:53Z/ |
|
|
| url |
https://security.openstack.org/ossa/OSSA-2024-001.html |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-32498, GHSA-r4v4-w9pv-6fph
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h6rd-5p7q-s3gq |
|
| 9 |
| url |
VCID-hbpu-kpak-2uer |
| vulnerability_id |
VCID-hbpu-kpak-2uer |
| summary |
The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo), when using the V2 API, allows remote authenticated users to read arbitrary files via a crafted backing file for a qcow2 image. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5163 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46901 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46846 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46866 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46789 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.4684 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46821 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46783 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46898 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46843 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00237 |
| scoring_system |
epss |
| scoring_elements |
0.46844 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5163 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://github.com/openstack/glance |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
7.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/glance |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5163, GHSA-q73f-vjc2-3gqf, PYSEC-2015-39
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hbpu-kpak-2uer |
|
| 10 |
| url |
VCID-k2u9-5g8v-bucz |
| vulnerability_id |
VCID-k2u9-5g8v-bucz |
| summary |
OpenStack Image Service (Glance) allows remote authenticated users to bypass access restrictions
OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allow remote authenticated users to change the status of their images and bypass access restrictions via the HTTP x-image-meta-status header to images/*. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5251 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38425 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38362 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38499 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38524 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38387 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38438 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38445 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38461 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38423 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00171 |
| scoring_system |
epss |
| scoring_elements |
0.38398 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5251 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5251, GHSA-q748-mcwg-xmqv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k2u9-5g8v-bucz |
|
| 11 |
| url |
VCID-mz1p-z6ca-wydw |
| vulnerability_id |
VCID-mz1p-z6ca-wydw |
| summary |
OpenStack Glance is vulnerable to Exposure of Sensitive Information
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1840 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.56994 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57017 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57038 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57027 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.56976 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5702 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57023 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57025 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.56974 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.56998 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.56879 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1840 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1840, GHSA-c8w9-83vg-r8vv
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mz1p-z6ca-wydw |
|
| 12 |
| url |
VCID-qwg8-evdp-jkfn |
| vulnerability_id |
VCID-qwg8-evdp-jkfn |
| summary |
store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and Grizzly, when in Swift single tenant mode, logs the Swift endpoint's user name and password in cleartext when the endpoint is misconfigured or unusable, allows remote authenticated users to obtain sensitive information by reading the error messages. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78932 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78891 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78958 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.7896 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78902 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.7892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78885 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78957 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78933 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78927 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0212 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0212, GHSA-xv7j-2v4w-cjvh, PYSEC-2013-37
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qwg8-evdp-jkfn |
|
| 13 |
| url |
VCID-ruvh-knrw-pygu |
| vulnerability_id |
VCID-ruvh-knrw-pygu |
| summary |
OpenStack Glance Server-Side Request Forgery (SSRF)
An SSRF issue was discovered in OpenStack Glance before Newton. The 'copy_from' feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as 'http://localhost:22'. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7200 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59147 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59164 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59145 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59142 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59091 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59126 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59028 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59327 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59287 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59321 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7200 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7200 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
|
| 1 |
| value |
5.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N |
|
| 2 |
| value |
5.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-7200 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7200, GHSA-j6mr-cm6x-h6jg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ruvh-knrw-pygu |
|
| 14 |
| url |
VCID-snjn-ymc5-qkg9 |
| vulnerability_id |
VCID-snjn-ymc5-qkg9 |
| summary |
The v1 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request, a different vulnerability than CVE-2012-5482. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4573 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74779 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74691 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74694 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74721 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74726 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74741 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74764 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74743 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74734 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00842 |
| scoring_system |
epss |
| scoring_elements |
0.74771 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4573 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-4573, GHSA-6rrm-xxvh-7r87, PYSEC-2012-29
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-snjn-ymc5-qkg9 |
|
| 15 |
| url |
VCID-t91r-2xja-17hy |
| vulnerability_id |
VCID-t91r-2xja-17hy |
| summary |
OpenStack Glance v2 API unrestricted path traversal through filesystem:// scheme
The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.1.4 and 2014.2.x before 2014.2.2 allows remote authenticated users to read or delete arbitrary files via a full pathname in a `filesystem://` URL in the image location property. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9493. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78122 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78031 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78039 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78051 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78077 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78082 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78108 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78088 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01105 |
| scoring_system |
epss |
| scoring_elements |
0.78123 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1195 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1195, GHSA-pwrj-f53c-f89j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t91r-2xja-17hy |
|
| 16 |
| url |
VCID-tafu-6gx3-n7bf |
| vulnerability_id |
VCID-tafu-6gx3-n7bf |
| summary |
openstack-glance: potential resource exhaustion task flow API |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3289 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58233 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58319 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58339 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58313 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58366 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58372 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.5839 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58367 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58348 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.5838 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00362 |
| scoring_system |
epss |
| scoring_elements |
0.58384 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3289 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3289
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tafu-6gx3-n7bf |
|
| 17 |
| url |
VCID-uveb-gt8h-1kcr |
| vulnerability_id |
VCID-uveb-gt8h-1kcr |
| summary |
OpenStack Image Registry and Delivery Service (Glance) Improper Input Validation vulnerability
The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote authenticated users with permission to insert or modify an image to execute arbitrary commands via a crafted location. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68231 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68189 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68204 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68229 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68216 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68182 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.6822 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.6812 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.68142 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00557 |
| scoring_system |
epss |
| scoring_elements |
0.6816 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0162 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0162, GHSA-r7pj-rvwg-vxhr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uveb-gt8h-1kcr |
|
| 18 |
| url |
VCID-wvq2-r6u8-7bet |
| vulnerability_id |
VCID-wvq2-r6u8-7bet |
| summary |
OpenStack Glance improper validation of the image_size_cap configuration option
OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3, when using the V2 API, does not properly enforce the image_size_cap configuration option, which allows remote authenticated users to cause a denial of service (disk consumption) by uploading a large image. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5356 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74161 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74064 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.7407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74096 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74068 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74101 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74116 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74137 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74119 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74113 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00804 |
| scoring_system |
epss |
| scoring_elements |
0.74152 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-5356 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-5356, GHSA-479j-jf2p-38pg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wvq2-r6u8-7bet |
|
| 19 |
| url |
VCID-xne9-2tb7-kyfq |
| vulnerability_id |
VCID-xne9-2tb7-kyfq |
| summary |
The v2 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to delete arbitrary non-protected images via an image deletion request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-4573. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5482 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.8044 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80447 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80394 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.8047 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80469 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80433 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80404 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80415 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80388 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80462 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.01403 |
| scoring_system |
epss |
| scoring_elements |
0.80443 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-5482 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-5482, GHSA-vwr9-9f8v-vp5m, PYSEC-2012-30
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xne9-2tb7-kyfq |
|
| 20 |
| url |
VCID-yzt4-fp6y-h3f1 |
| vulnerability_id |
VCID-yzt4-fp6y-h3f1 |
| summary |
OpenStack Glance <29.1.1, >=30.0.0 <30.1.1, ==31.0.0 is affected by Server-Side Request Forgery (SSRF). By use of HTTP redirects, an authenticated user can bypass URL validation checks and redirect to internal services. Only glance image import functionality is affected. In particular, the web-download and glance-download import methods are subject to this vulnerability, as is the optional (not enabled by default) ovf_process image import plugin. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34881 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07267 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07311 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08421 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08443 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08117 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0813 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08455 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0846 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08372 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34881 |
|
| 2 |
| reference_url |
https://bugs.launchpad.net/glance/+bug/2138602 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N |
|
| 1 |
| value |
5.0 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:47:30Z/ |
|
|
| url |
https://bugs.launchpad.net/glance/+bug/2138602 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34881, GHSA-mc26-q38v-83gv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yzt4-fp6y-h3f1 |
|
| 21 |
| url |
VCID-zgpj-5an4-mucg |
| vulnerability_id |
VCID-zgpj-5an4-mucg |
| summary |
OpenStack Image Registry and Delivery Service (Glance) 2013.2 through 2013.2.1 and Icehouse before icehouse-2 logs a URL containing the Swift store backend password when authentication fails and WARNING level logging is enabled, which allows local users to obtain sensitive information by reading the log. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-1948 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19261 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19359 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.1926 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19391 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19395 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19347 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19291 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19252 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-1948 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/openstack/glance |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
5.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/openstack/glance |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-1948, GHSA-4xw6-hj5p-4j79, PYSEC-2014-102
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zgpj-5an4-mucg |
|
| 22 |
| url |
VCID-zy9m-d25c-5uga |
| vulnerability_id |
VCID-zy9m-d25c-5uga |
| summary |
OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption
A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87769 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87701 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87712 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87723 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87725 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87746 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87752 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87763 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87757 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.87756 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0359 |
| scoring_system |
epss |
| scoring_elements |
0.8777 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5162 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-5162, GHSA-g2j5-7vgx-6xrx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zy9m-d25c-5uga |
|