Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-d5eh-h7qr-9kbt
Summarypython-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
Aliases
0
alias CVE-2013-2167
1
alias GHSA-9vg3-cf92-h2h7
2
alias PYSEC-2019-161
Fixed_packages
0
url pkg:deb/debian/python-keystoneclient@1:0.2.5-2?distro=trixie
purl pkg:deb/debian/python-keystoneclient@1:0.2.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@1:0.2.5-2%3Fdistro=trixie
1
url pkg:deb/debian/python-keystoneclient@1:0.10.1-2
purl pkg:deb/debian/python-keystoneclient@1:0.10.1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5st1-zx32-3yfw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@1:0.10.1-2
2
url pkg:deb/debian/python-keystoneclient@1:4.1.1-2?distro=trixie
purl pkg:deb/debian/python-keystoneclient@1:4.1.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@1:4.1.1-2%3Fdistro=trixie
3
url pkg:deb/debian/python-keystoneclient@1:5.0.1-3?distro=trixie
purl pkg:deb/debian/python-keystoneclient@1:5.0.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@1:5.0.1-3%3Fdistro=trixie
4
url pkg:deb/debian/python-keystoneclient@1:5.6.0-2?distro=trixie
purl pkg:deb/debian/python-keystoneclient@1:5.6.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@1:5.6.0-2%3Fdistro=trixie
5
url pkg:deb/debian/python-keystoneclient@1:5.7.0-4?distro=trixie
purl pkg:deb/debian/python-keystoneclient@1:5.7.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@1:5.7.0-4%3Fdistro=trixie
6
url pkg:deb/debian/python-keystoneclient@1:5.8.0-4?distro=trixie
purl pkg:deb/debian/python-keystoneclient@1:5.8.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@1:5.8.0-4%3Fdistro=trixie
7
url pkg:pypi/python-keystoneclient@0.3.0
purl pkg:pypi/python-keystoneclient@0.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-44u3-6h7t-dbah
1
vulnerability VCID-5st1-zx32-3yfw
2
vulnerability VCID-79rs-7766-4ycf
3
vulnerability VCID-uexc-7rt7-hbgx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/python-keystoneclient@0.3.0
Affected_packages
0
url pkg:deb/debian/python-keystoneclient@2012.1-3%2Bdeb7u1
purl pkg:deb/debian/python-keystoneclient@2012.1-3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-44u3-6h7t-dbah
1
vulnerability VCID-5st1-zx32-3yfw
2
vulnerability VCID-79rs-7766-4ycf
3
vulnerability VCID-8yta-5ta1-fkfm
4
vulnerability VCID-d5eh-h7qr-9kbt
5
vulnerability VCID-p776-3n3m-wkhz
6
vulnerability VCID-ryxy-ymcn-3bhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-keystoneclient@2012.1-3%252Bdeb7u1
1
url pkg:pypi/python-keystoneclient@0.2.3
purl pkg:pypi/python-keystoneclient@0.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-44u3-6h7t-dbah
1
vulnerability VCID-5st1-zx32-3yfw
2
vulnerability VCID-5tkb-w761-4qc6
3
vulnerability VCID-79rs-7766-4ycf
4
vulnerability VCID-8yta-5ta1-fkfm
5
vulnerability VCID-d5eh-h7qr-9kbt
6
vulnerability VCID-p776-3n3m-wkhz
7
vulnerability VCID-ryxy-ymcn-3bhr
8
vulnerability VCID-uexc-7rt7-hbgx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/python-keystoneclient@0.2.3
2
url pkg:pypi/python-keystoneclient@0.2.4
purl pkg:pypi/python-keystoneclient@0.2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-44u3-6h7t-dbah
1
vulnerability VCID-5st1-zx32-3yfw
2
vulnerability VCID-79rs-7766-4ycf
3
vulnerability VCID-8yta-5ta1-fkfm
4
vulnerability VCID-d5eh-h7qr-9kbt
5
vulnerability VCID-uexc-7rt7-hbgx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/python-keystoneclient@0.2.4
3
url pkg:pypi/python-keystoneclient@0.2.5
purl pkg:pypi/python-keystoneclient@0.2.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-44u3-6h7t-dbah
1
vulnerability VCID-5st1-zx32-3yfw
2
vulnerability VCID-79rs-7766-4ycf
3
vulnerability VCID-8yta-5ta1-fkfm
4
vulnerability VCID-d5eh-h7qr-9kbt
5
vulnerability VCID-uexc-7rt7-hbgx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/python-keystoneclient@0.2.5
4
url pkg:rpm/redhat/python-keystoneclient@1:0.2.3-5?arch=el6ost
purl pkg:rpm/redhat/python-keystoneclient@1:0.2.3-5?arch=el6ost
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8yta-5ta1-fkfm
1
vulnerability VCID-d5eh-h7qr-9kbt
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-keystoneclient@1:0.2.3-5%3Farch=el6ost
References
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0992.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0992.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2167.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2167.json
3
reference_url https://access.redhat.com/security/cve/cve-2013-2167
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/cve-2013-2167
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2167
reference_id
reference_type
scores
0
value 0.00826
scoring_system epss
scoring_elements 0.74426
published_at 2026-04-07T12:55:00Z
1
value 0.00826
scoring_system epss
scoring_elements 0.7445
published_at 2026-04-04T12:55:00Z
2
value 0.00826
scoring_system epss
scoring_elements 0.74424
published_at 2026-04-02T12:55:00Z
3
value 0.00826
scoring_system epss
scoring_elements 0.7442
published_at 2026-04-01T12:55:00Z
4
value 0.00826
scoring_system epss
scoring_elements 0.74506
published_at 2026-04-21T12:55:00Z
5
value 0.00826
scoring_system epss
scoring_elements 0.74507
published_at 2026-04-16T12:55:00Z
6
value 0.00826
scoring_system epss
scoring_elements 0.74469
published_at 2026-04-13T12:55:00Z
7
value 0.00826
scoring_system epss
scoring_elements 0.74477
published_at 2026-04-12T12:55:00Z
8
value 0.00826
scoring_system epss
scoring_elements 0.74496
published_at 2026-04-11T12:55:00Z
9
value 0.00826
scoring_system epss
scoring_elements 0.74474
published_at 2026-04-09T12:55:00Z
10
value 0.00826
scoring_system epss
scoring_elements 0.74458
published_at 2026-04-08T12:55:00Z
11
value 0.00826
scoring_system epss
scoring_elements 0.74514
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2167
5
reference_url https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2167
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/85492
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/85492
9
reference_url https://github.com/advisories/GHSA-9vg3-cf92-h2h7
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-9vg3-cf92-h2h7
10
reference_url https://github.com/openstack/python-keystoneclient
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/python-keystoneclient
11
reference_url https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e
12
reference_url https://github.com/openstack/python-keystoneclient/commits/0.3.0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/python-keystoneclient/commits/0.3.0
13
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2019-161.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2019-161.yaml
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2167
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2167
15
reference_url https://security-tracker.debian.org/tracker/CVE-2013-2167
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security-tracker.debian.org/tracker/CVE-2013-2167
16
reference_url http://www.openwall.com/lists/oss-security/2013/06/19/5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/06/19/5
17
reference_url http://www.securityfocus.com/bid/60680
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/60680
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713819
reference_id 713819
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713819
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=974271
reference_id 974271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=974271
20
reference_url https://access.redhat.com/errata/RHSA-2013:0992
reference_id RHSA-2013:0992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0992
Weaknesses
0
cwe_id 345
name Insufficient Verification of Data Authenticity
description The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
1
cwe_id 349
name Acceptance of Extraneous Untrusted Data With Trusted Data
description The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score9.0 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-d5eh-h7qr-9kbt