Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mz1p-z6ca-wydw
Summary
OpenStack Glance is vulnerable to Exposure of Sensitive Information
The v1 API in OpenStack Glance Essex (2012.1), Folsom (2012.2), and Grizzly, when using the single-tenant Swift or S3 store, reports the location field, which allows remote authenticated users to obtain the operator's backend credentials via a request for a cached image.
Aliases
0
alias CVE-2013-1840
1
alias GHSA-c8w9-83vg-r8vv
Fixed_packages
0
url pkg:deb/debian/glance@2012.1.1-5?distro=trixie
purl pkg:deb/debian/glance@2012.1.1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2012.1.1-5%3Fdistro=trixie
1
url pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:21.0.0-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:25.1.0-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
purl pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:30.0.0-3%3Fdistro=trixie
4
url pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-1%3Fdistro=trixie
5
url pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-2%3Fdistro=trixie
Affected_packages
References
0
reference_url http://osvdb.org/91304
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://osvdb.org/91304
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0707.html
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0707.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1840.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1840.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1840
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.56994
published_at 2026-04-13T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.57017
published_at 2026-04-12T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.57038
published_at 2026-04-11T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.57027
published_at 2026-04-09T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.56976
published_at 2026-04-02T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.5702
published_at 2026-04-18T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57023
published_at 2026-04-16T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57025
published_at 2026-04-08T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.56974
published_at 2026-04-07T12:55:00Z
9
value 0.00344
scoring_system epss
scoring_elements 0.56998
published_at 2026-04-04T12:55:00Z
10
value 0.00344
scoring_system epss
scoring_elements 0.56879
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1840
4
reference_url https://bugs.launchpad.net/glance/+bug/1135541
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/glance/+bug/1135541
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1840
6
reference_url http://secunia.com/advisories/52565
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/52565
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/82878
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/82878
8
reference_url https://github.com/openstack/glance
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance
9
reference_url https://github.com/openstack/glance/commit/74b067df9726f9cf3e6e17e248719794a6ee0745
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/74b067df9726f9cf3e6e17e248719794a6ee0745
10
reference_url https://github.com/openstack/glance/commit/dd849a9be540bedd4fd904cc0b86ccd9c3e34af2
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/dd849a9be540bedd4fd904cc0b86ccd9c3e34af2
11
reference_url https://github.com/openstack/glance/commit/e75764eee34915f8bc5b664ac18e47a556c9d3dd
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/e75764eee34915f8bc5b664ac18e47a556c9d3dd
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1840
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:N
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-1840
13
reference_url https://review.openstack.org/#/c/24437
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/24437
14
reference_url https://review.openstack.org/#/c/24437/
reference_id
reference_type
scores
url https://review.openstack.org/#/c/24437/
15
reference_url https://review.openstack.org/#/c/24438
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/24438
16
reference_url https://review.openstack.org/#/c/24438/
reference_id
reference_type
scores
url https://review.openstack.org/#/c/24438/
17
reference_url https://review.openstack.org/#/c/24439
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/24439
18
reference_url https://review.openstack.org/#/c/24439/
reference_id
reference_type
scores
url https://review.openstack.org/#/c/24439/
19
reference_url http://www.openwall.com/lists/oss-security/2013/03/14/15
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/03/14/15
20
reference_url http://www.securityfocus.com/bid/58490
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/58490
21
reference_url http://www.ubuntu.com/usn/USN-1764-1
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-1764-1
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703063
reference_id 703063
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=703063
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:amazon:s3_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:amazon:s3_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:amazon:s3_store:-:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:glance:v1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:glance:v1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:glance:v1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:-:*:*:*:*:*:*:*
28
reference_url https://github.com/advisories/GHSA-c8w9-83vg-r8vv
reference_id GHSA-c8w9-83vg-r8vv
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c8w9-83vg-r8vv
29
reference_url https://usn.ubuntu.com/1764-1/
reference_id USN-1764-1
reference_type
scores
url https://usn.ubuntu.com/1764-1/
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 201
name Insertion of Sensitive Information Into Sent Data
description The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor.
Exploits
Severity_range_score0.1 - 6.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mz1p-z6ca-wydw