Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-fh42-vdj2-dqgu
Summary
OpenStack Glance Bypass the storage quota and Denial of service
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting an image in the saving state.
Aliases
0
alias CVE-2014-9623
1
alias GHSA-j4mh-9wq6-8rg6
Fixed_packages
0
url pkg:deb/debian/glance@2014.1.3-12
purl pkg:deb/debian/glance@2014.1.3-12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9sg5-tbvn-syba
1
vulnerability VCID-br4q-499g-vqhg
2
vulnerability VCID-g1mf-hrds-bubz
3
vulnerability VCID-h6rd-5p7q-s3gq
4
vulnerability VCID-hbpu-kpak-2uer
5
vulnerability VCID-k2u9-5g8v-bucz
6
vulnerability VCID-ruvh-knrw-pygu
7
vulnerability VCID-tafu-6gx3-n7bf
8
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1.3-12
1
url pkg:deb/debian/glance@2014.1.3-12?distro=trixie
purl pkg:deb/debian/glance@2014.1.3-12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1.3-12%3Fdistro=trixie
2
url pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:21.0.0-2%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:25.1.0-2%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
purl pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:30.0.0-3%3Fdistro=trixie
5
url pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-1%3Fdistro=trixie
6
url pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-2%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/glance@2012.1.1-5
purl pkg:deb/debian/glance@2012.1.1-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9sg5-tbvn-syba
1
vulnerability VCID-9zm2-a38f-33g3
2
vulnerability VCID-br4q-499g-vqhg
3
vulnerability VCID-fh42-vdj2-dqgu
4
vulnerability VCID-fwaa-nnw4-1qcz
5
vulnerability VCID-g1mf-hrds-bubz
6
vulnerability VCID-h6rd-5p7q-s3gq
7
vulnerability VCID-hbpu-kpak-2uer
8
vulnerability VCID-k2u9-5g8v-bucz
9
vulnerability VCID-ruvh-knrw-pygu
10
vulnerability VCID-t91r-2xja-17hy
11
vulnerability VCID-tafu-6gx3-n7bf
12
vulnerability VCID-uveb-gt8h-1kcr
13
vulnerability VCID-wvq2-r6u8-7bet
14
vulnerability VCID-zgpj-5an4-mucg
15
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2012.1.1-5
1
url pkg:rpm/redhat/openstack-glance@2014.1.4-1?arch=el7ost
purl pkg:rpm/redhat/openstack-glance@2014.1.4-1?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fh42-vdj2-dqgu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-glance@2014.1.4-1%3Farch=el7ost
2
url pkg:rpm/redhat/openstack-glance@2014.1.4-1?arch=el6ost
purl pkg:rpm/redhat/openstack-glance@2014.1.4-1?arch=el6ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fh42-vdj2-dqgu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-glance@2014.1.4-1%3Farch=el6ost
3
url pkg:rpm/redhat/openstack-glance@2014.2.2-1?arch=el7ost
purl pkg:rpm/redhat/openstack-glance@2014.2.2-1?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fh42-vdj2-dqgu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-glance@2014.2.2-1%3Farch=el7ost
4
url pkg:rpm/redhat/python-glanceclient@1:0.14.2-2?arch=el7ost
purl pkg:rpm/redhat/python-glanceclient@1:0.14.2-2?arch=el7ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-fh42-vdj2-dqgu
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-glanceclient@1:0.14.2-2%3Farch=el7ost
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2015-0644.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-0644.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-0837.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-0837.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-0838.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-0838.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9623.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9623.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9623
reference_id
reference_type
scores
0
value 0.00353
scoring_system epss
scoring_elements 0.57703
published_at 2026-04-13T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57722
published_at 2026-04-12T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57743
published_at 2026-04-11T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57728
published_at 2026-04-09T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.57696
published_at 2026-04-04T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57729
published_at 2026-04-18T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.57733
published_at 2026-04-16T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.57725
published_at 2026-04-08T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.5759
published_at 2026-04-01T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57675
published_at 2026-04-02T12:55:00Z
10
value 0.00353
scoring_system epss
scoring_elements 0.57671
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9623
5
reference_url https://bugs.launchpad.net/glance/+bug/1383973
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/glance/+bug/1383973
6
reference_url https://bugs.launchpad.net/glance/+bug/1398830
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/glance/+bug/1398830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9623
8
reference_url http://secunia.com/advisories/62165
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://secunia.com/advisories/62165
9
reference_url https://github.com/openstack/glance
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance
10
reference_url https://github.com/openstack/glance/commit/0dc8fbb3479a53c5bba8475d14f4c7206904c5ea
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/0dc8fbb3479a53c5bba8475d14f4c7206904c5ea
11
reference_url https://github.com/openstack/glance/commit/7d5d8657fd70b20518610b3c6f8e41e16c72fa31
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/7d5d8657fd70b20518610b3c6f8e41e16c72fa31
12
reference_url https://github.com/openstack/glance/commit/f1260cc771ee068651aa62b972bef49d9af81eb0
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/glance/commit/f1260cc771ee068651aa62b972bef49d9af81eb0
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9623
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-9623
14
reference_url https://security.openstack.org/ossa/OSSA-2015-003.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.openstack.org/ossa/OSSA-2015-003.html
15
reference_url http://www.openwall.com/lists/oss-security/2015/01/18/4
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2015/01/18/4
16
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1183647
reference_id 1183647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1183647
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776580
reference_id 776580
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776580
19
reference_url https://github.com/advisories/GHSA-j4mh-9wq6-8rg6
reference_id GHSA-j4mh-9wq6-8rg6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j4mh-9wq6-8rg6
20
reference_url https://access.redhat.com/errata/RHSA-2015:0644
reference_id RHSA-2015:0644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0644
21
reference_url https://access.redhat.com/errata/RHSA-2015:0837
reference_id RHSA-2015:0837
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0837
22
reference_url https://access.redhat.com/errata/RHSA-2015:0838
reference_id RHSA-2015:0838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0838
Weaknesses
0
cwe_id 841
name Improper Enforcement of Behavioral Workflow
description The product supports a session in which more than one behavior must be performed by an actor, but it does not properly ensure that the actor performs the behaviors in the required sequence.
1
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-fh42-vdj2-dqgu