Search for packages
| purl | pkg:pypi/keystone@2014.2 |
| Tags | Ghost |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-9dhg-r711-yfg6
Aliases: CVE-2015-3646 GHSA-jwpw-ppj5-7h4w |
Exposure of Sensitive Information to an Unauthorized Actor OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T16:01:30.392342+00:00 | GHSA Importer | Affected by | VCID-9dhg-r711-yfg6 | https://github.com/advisories/GHSA-jwpw-ppj5-7h4w | 38.0.0 |
| 2026-04-01T12:50:06.910143+00:00 | GitLab Importer | Affected by | VCID-9dhg-r711-yfg6 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/pypi/keystone/CVE-2015-3646.yml | 38.0.0 |