Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wvq2-r6u8-7bet
Summary
OpenStack Glance improper validation of the image_size_cap configuration option
OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3, when using the V2 API, does not properly enforce the image_size_cap configuration option, which allows remote authenticated users to cause a denial of service (disk consumption) by uploading a large image.
Aliases
0
alias CVE-2014-5356
1
alias GHSA-479j-jf2p-38pg
Fixed_packages
0
url pkg:deb/debian/glance@2014.1.3-1?distro=trixie
purl pkg:deb/debian/glance@2014.1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glance@2014.1.3-12
purl pkg:deb/debian/glance@2014.1.3-12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9sg5-tbvn-syba
1
vulnerability VCID-br4q-499g-vqhg
2
vulnerability VCID-g1mf-hrds-bubz
3
vulnerability VCID-h6rd-5p7q-s3gq
4
vulnerability VCID-hbpu-kpak-2uer
5
vulnerability VCID-k2u9-5g8v-bucz
6
vulnerability VCID-ruvh-knrw-pygu
7
vulnerability VCID-tafu-6gx3-n7bf
8
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1.3-12
2
url pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:21.0.0-2%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:25.1.0-2%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
purl pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:30.0.0-3%3Fdistro=trixie
5
url pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-1%3Fdistro=trixie
6
url pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-2%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/glance@2012.1.1-5
purl pkg:deb/debian/glance@2012.1.1-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9sg5-tbvn-syba
1
vulnerability VCID-9zm2-a38f-33g3
2
vulnerability VCID-br4q-499g-vqhg
3
vulnerability VCID-fh42-vdj2-dqgu
4
vulnerability VCID-fwaa-nnw4-1qcz
5
vulnerability VCID-g1mf-hrds-bubz
6
vulnerability VCID-h6rd-5p7q-s3gq
7
vulnerability VCID-hbpu-kpak-2uer
8
vulnerability VCID-k2u9-5g8v-bucz
9
vulnerability VCID-ruvh-knrw-pygu
10
vulnerability VCID-t91r-2xja-17hy
11
vulnerability VCID-tafu-6gx3-n7bf
12
vulnerability VCID-uveb-gt8h-1kcr
13
vulnerability VCID-wvq2-r6u8-7bet
14
vulnerability VCID-zgpj-5an4-mucg
15
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2012.1.1-5
1
url pkg:rpm/redhat/openstack-glance@2013.2.4-1?arch=el6ost
purl pkg:rpm/redhat/openstack-glance@2013.2.4-1?arch=el6ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wvq2-r6u8-7bet
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-glance@2013.2.4-1%3Farch=el6ost
2
url pkg:rpm/redhat/openstack-glance@2014.1.2-3?arch=el7ost
purl pkg:rpm/redhat/openstack-glance@2014.1.2-3?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wvq2-r6u8-7bet
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-glance@2014.1.2-3%3Farch=el7ost
3
url pkg:rpm/redhat/openstack-glance@2014.1.2-5?arch=el6ost
purl pkg:rpm/redhat/openstack-glance@2014.1.2-5?arch=el6ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wvq2-r6u8-7bet
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-glance@2014.1.2-5%3Farch=el6ost
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-1337.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-1337.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-1338.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-1338.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1685.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-1685.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5356.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5356.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5356
reference_id
reference_type
scores
0
value 0.00804
scoring_system epss
scoring_elements 0.74161
published_at 2026-04-18T12:55:00Z
1
value 0.00804
scoring_system epss
scoring_elements 0.74064
published_at 2026-04-01T12:55:00Z
2
value 0.00804
scoring_system epss
scoring_elements 0.7407
published_at 2026-04-02T12:55:00Z
3
value 0.00804
scoring_system epss
scoring_elements 0.74096
published_at 2026-04-04T12:55:00Z
4
value 0.00804
scoring_system epss
scoring_elements 0.74068
published_at 2026-04-07T12:55:00Z
5
value 0.00804
scoring_system epss
scoring_elements 0.74101
published_at 2026-04-08T12:55:00Z
6
value 0.00804
scoring_system epss
scoring_elements 0.74116
published_at 2026-04-09T12:55:00Z
7
value 0.00804
scoring_system epss
scoring_elements 0.74137
published_at 2026-04-11T12:55:00Z
8
value 0.00804
scoring_system epss
scoring_elements 0.74119
published_at 2026-04-12T12:55:00Z
9
value 0.00804
scoring_system epss
scoring_elements 0.74113
published_at 2026-04-13T12:55:00Z
10
value 0.00804
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5356
5
reference_url https://bugs.launchpad.net/glance/+bug/1315321
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/glance/+bug/1315321
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5356
7
reference_url http://secunia.com/advisories/60743
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/60743
8
reference_url https://github.com/openstack/glance
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance
9
reference_url https://github.com/openstack/glance/commit/12f43cfed5a47cd16f08b7dad2424da0fc362e47
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/12f43cfed5a47cd16f08b7dad2424da0fc362e47
10
reference_url https://github.com/openstack/glance/commit/31a4d1852a0c27bac5757c192f300f051229a312
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/31a4d1852a0c27bac5757c192f300f051229a312
11
reference_url https://github.com/openstack/glance/commit/92ab00fca6926eaf3f7f92a955a5e07140063718
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/92ab00fca6926eaf3f7f92a955a5e07140063718
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5356
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-5356
13
reference_url http://www.openwall.com/lists/oss-security/2014/08/21/6
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/08/21/6
14
reference_url http://www.ubuntu.com/usn/USN-2322-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2322-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1131770
reference_id 1131770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1131770
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2013.2.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):2014.1.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):juno-1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):juno-1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):juno-1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):juno-2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):juno-2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:image_registry_and_delivery_service_\(glance\):juno-2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
26
reference_url https://github.com/advisories/GHSA-479j-jf2p-38pg
reference_id GHSA-479j-jf2p-38pg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-479j-jf2p-38pg
27
reference_url https://access.redhat.com/errata/RHSA-2014:1337
reference_id RHSA-2014:1337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1337
28
reference_url https://access.redhat.com/errata/RHSA-2014:1338
reference_id RHSA-2014:1338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1338
29
reference_url https://access.redhat.com/errata/RHSA-2014:1685
reference_id RHSA-2014:1685
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1685
30
reference_url https://usn.ubuntu.com/2322-1/
reference_id USN-2322-1
reference_type
scores
url https://usn.ubuntu.com/2322-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
2
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
4
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wvq2-r6u8-7bet