Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-uveb-gt8h-1kcr
Summary
OpenStack Image Registry and Delivery Service (Glance) Improper Input Validation vulnerability
The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote authenticated users with permission to insert or modify an image to execute arbitrary commands via a crafted location.
Aliases
0
alias CVE-2014-0162
1
alias GHSA-r7pj-rvwg-vxhr
Fixed_packages
0
url pkg:deb/debian/glance@2014.1-1?distro=trixie
purl pkg:deb/debian/glance@2014.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1-1%3Fdistro=trixie
1
url pkg:deb/debian/glance@2014.1.3-12
purl pkg:deb/debian/glance@2014.1.3-12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9sg5-tbvn-syba
1
vulnerability VCID-br4q-499g-vqhg
2
vulnerability VCID-g1mf-hrds-bubz
3
vulnerability VCID-h6rd-5p7q-s3gq
4
vulnerability VCID-hbpu-kpak-2uer
5
vulnerability VCID-k2u9-5g8v-bucz
6
vulnerability VCID-ruvh-knrw-pygu
7
vulnerability VCID-tafu-6gx3-n7bf
8
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2014.1.3-12
2
url pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glance@2:21.0.0-2%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:21.0.0-2%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/glance@2:25.1.0-2%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:25.1.0-2%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
purl pkg:deb/debian/glance@2:30.0.0-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yzt4-fp6y-h3f1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:30.0.0-3%3Fdistro=trixie
5
url pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-1%3Fdistro=trixie
6
url pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
purl pkg:deb/debian/glance@2:32.0.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2:32.0.0-2%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/glance@2012.1.1-5
purl pkg:deb/debian/glance@2012.1.1-5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9sg5-tbvn-syba
1
vulnerability VCID-9zm2-a38f-33g3
2
vulnerability VCID-br4q-499g-vqhg
3
vulnerability VCID-fh42-vdj2-dqgu
4
vulnerability VCID-fwaa-nnw4-1qcz
5
vulnerability VCID-g1mf-hrds-bubz
6
vulnerability VCID-h6rd-5p7q-s3gq
7
vulnerability VCID-hbpu-kpak-2uer
8
vulnerability VCID-k2u9-5g8v-bucz
9
vulnerability VCID-ruvh-knrw-pygu
10
vulnerability VCID-t91r-2xja-17hy
11
vulnerability VCID-tafu-6gx3-n7bf
12
vulnerability VCID-uveb-gt8h-1kcr
13
vulnerability VCID-wvq2-r6u8-7bet
14
vulnerability VCID-zgpj-5an4-mucg
15
vulnerability VCID-zy9m-d25c-5uga
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glance@2012.1.1-5
1
url pkg:pypi/glance@2013.2
purl pkg:pypi/glance@2013.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-uveb-gt8h-1kcr
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/glance@2013.2
2
url pkg:rpm/redhat/openstack-glance@2013.2.2-3?arch=el6ost
purl pkg:rpm/redhat/openstack-glance@2013.2.2-3?arch=el6ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-uveb-gt8h-1kcr
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-glance@2013.2.2-3%3Farch=el6ost
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-0455.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0455.html
1
reference_url https://access.redhat.com/errata/RHSA-2014:0455
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2014:0455
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0162.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0162.json
3
reference_url https://access.redhat.com/security/cve/CVE-2014-0162
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-0162
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0162
reference_id
reference_type
scores
0
value 0.00557
scoring_system epss
scoring_elements 0.68231
published_at 2026-04-18T12:55:00Z
1
value 0.00557
scoring_system epss
scoring_elements 0.68138
published_at 2026-04-07T12:55:00Z
2
value 0.00557
scoring_system epss
scoring_elements 0.68189
published_at 2026-04-08T12:55:00Z
3
value 0.00557
scoring_system epss
scoring_elements 0.68204
published_at 2026-04-09T12:55:00Z
4
value 0.00557
scoring_system epss
scoring_elements 0.68229
published_at 2026-04-11T12:55:00Z
5
value 0.00557
scoring_system epss
scoring_elements 0.68216
published_at 2026-04-12T12:55:00Z
6
value 0.00557
scoring_system epss
scoring_elements 0.68182
published_at 2026-04-13T12:55:00Z
7
value 0.00557
scoring_system epss
scoring_elements 0.6822
published_at 2026-04-16T12:55:00Z
8
value 0.00557
scoring_system epss
scoring_elements 0.6812
published_at 2026-04-01T12:55:00Z
9
value 0.00557
scoring_system epss
scoring_elements 0.68142
published_at 2026-04-02T12:55:00Z
10
value 0.00557
scoring_system epss
scoring_elements 0.6816
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0162
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1085163
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1085163
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0162
7
reference_url https://launchpad.net/bugs/1298698
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://launchpad.net/bugs/1298698
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0162
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-0162
9
reference_url https://opendev.org/openstack/glance
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/glance
10
reference_url http://www.openwall.com/lists/oss-security/2014/04/10/13
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/04/10/13
11
reference_url http://www.ubuntu.com/usn/USN-2193-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2193-1
12
reference_url https://github.com/advisories/GHSA-r7pj-rvwg-vxhr
reference_id GHSA-r7pj-rvwg-vxhr
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r7pj-rvwg-vxhr
13
reference_url https://usn.ubuntu.com/2193-1/
reference_id USN-2193-1
reference_type
scores
url https://usn.ubuntu.com/2193-1/
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
1
cwe_id 78
name Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
description The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-uveb-gt8h-1kcr