Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-8drd-ce7k-57cn |
| Summary | The image signature algorithm in OpenStack Glance 11.0.0 allows remote attackers to bypass the signature verification process via a crafted image, which triggers an MD5 collision. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-wmhw-fvg9-87fc |
|
| 2 |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8234 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32596 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32533 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32516 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32561 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32665 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32701 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32523 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.3257 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32598 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32146 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32231 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32347 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00131 |
| scoring_system |
epss |
| scoring_elements |
0.32548 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-8234 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2015-8234 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
5.5 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
5.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2015-8234 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
328 |
| name |
Use of Weak Hash |
| description |
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack). |
|
| 1 |
| cwe_id |
327 |
| name |
Use of a Broken or Risky Cryptographic Algorithm |
| description |
The product uses a broken or risky cryptographic algorithm or protocol. |
|
| 2 |
| cwe_id |
310 |
| name |
Cryptographic Issues |
| description |
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed. |
|
| 3 |
| cwe_id |
937 |
| name |
OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013. |
|
| 4 |
| cwe_id |
1035 |
| name |
OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities |
| description |
Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017. |
|
|
| Exploits |
|
| Severity_range_score | 4.0 - 6.9 |
| Exploitability | 0.5 |
| Weighted_severity | 6.2 |
| Risk_score | 3.1 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-8drd-ce7k-57cn |