Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/121449?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/121449?format=api", "purl": "pkg:rpm/redhat/python-keystoneclient@1:0.9.0-5?arch=el6ost", "type": "rpm", "namespace": "redhat", "name": "python-keystoneclient", "version": "1:0.9.0-5", "qualifiers": { "arch": "el6ost" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86295?format=api", "vulnerability_id": "VCID-1v7s-m45t-uka9", "summary": "check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4", "references": [ { "reference_url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984" }, { "reference_url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5340.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86629", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86425", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86435", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86454", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86483", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86499", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86495", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.8649", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86532", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86531", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86551", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.8657", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86587", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86583", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86595", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5340" }, { "reference_url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337", "reference_id": "1132337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5340", "reference_id": "CVE-2014-5340", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" } ], "fixed_packages": [], "aliases": [ "CVE-2014-5340" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1v7s-m45t-uka9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86293?format=api", "vulnerability_id": "VCID-4kqn-hmxd-z3a2", "summary": "check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4", "references": [ { "reference_url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982&HTML=yes", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982&HTML=yes" }, { "reference_url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5338.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5338.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52269", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52112", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52148", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52248", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52232", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52256", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.5226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52243", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52192", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.522", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52164", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52109", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.5216", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52203", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52165", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52189", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5338" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383" }, { "reference_url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/69312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69312" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337", "reference_id": "1132337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5338", "reference_id": "CVE-2014-5338", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" } ], "fixed_packages": [], "aliases": [ "CVE-2014-5338" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4kqn-hmxd-z3a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86294?format=api", "vulnerability_id": "VCID-529v-bq9y-eyaa", "summary": "check-mk: multiple flaws fixed in versions 1.2.4p4 and 1.2.5i4", "references": [ { "reference_url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983" }, { "reference_url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5339.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67218", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.66973", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67009", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67059", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67072", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67091", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67077", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67046", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67079", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67074", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67095", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67108", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67118", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67157", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67131", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67155", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-5339" }, { "reference_url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337", "reference_id": "1132337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132337" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5339", "reference_id": "CVE-2014-5339", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" } ], "fixed_packages": [], "aliases": [ "CVE-2014-5339" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-529v-bq9y-eyaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5439?format=api", "vulnerability_id": "VCID-79rs-7766-4ycf", "summary": "OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the \"insecure\" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1783.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1783.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1784.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1784.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0020.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7144.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7144.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58629", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58415", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.5852", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58491", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58543", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.5855", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58566", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58546", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58526", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.5856", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58564", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.5851", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58509", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58474", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58518", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58576", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.5853", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58558", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7144" }, { "reference_url": "https://bugs.launchpad.net/python-keystoneclient/+bug/1353315", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugs.launchpad.net/python-keystoneclient/+bug/1353315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7144" }, { "reference_url": "http://secunia.com/advisories/62709", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62709" }, { "reference_url": "https://github.com/openstack/ossa/blob/23e15de721f4a6890374a231d93524e02965a97f/ossa/OSSA-2014-030.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/ossa/blob/23e15de721f4a6890374a231d93524e02965a97f/ossa/OSSA-2014-030.yaml" }, { "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/keystonemiddleware/PYSEC-2014-26.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pypa/advisory-database/tree/main/vulns/keystonemiddleware/PYSEC-2014-26.yaml" }, { "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2014-71.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2014-71.yaml" }, { "reference_url": "https://web.archive.org/web/20200228053850/http://www.securityfocus.com/bid/69864", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20200228053850/http://www.securityfocus.com/bid/69864" }, { "reference_url": "https://web.archive.org/web/20200228060511/https://www.securityfocus.com/bid/69864", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20200228060511/https://www.securityfocus.com/bid/69864" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/25/51", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2014/09/25/51" }, { "reference_url": "http://www.securityfocus.com/bid/69864", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/69864" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2705-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ubuntu.com/usn/USN-2705-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1143808", "reference_id": "1143808", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1143808" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762748", "reference_id": "762748", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762748" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762749", "reference_id": "762749", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762749" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystonemiddleware:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:keystonemiddleware:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystonemiddleware:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystonemiddleware:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:keystonemiddleware:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystonemiddleware:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystonemiddleware:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:keystonemiddleware:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystonemiddleware:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:python-keystoneclient:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:python-keystoneclient:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:python-keystoneclient:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7144", "reference_id": "CVE-2014-7144", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "8.2", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7144" }, { "reference_url": "https://github.com/advisories/GHSA-7f2c-vp52-gmfw", "reference_id": "GHSA-7f2c-vp52-gmfw", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-7f2c-vp52-gmfw" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1783", "reference_id": "RHSA-2014:1783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1784", "reference_id": "RHSA-2014:1784", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0020", "reference_id": "RHSA-2015:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0020" }, { "reference_url": "https://usn.ubuntu.com/2705-1/", "reference_id": "USN-2705-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2705-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-7144", "GHSA-7f2c-vp52-gmfw", "PYSEC-2014-26", "PYSEC-2014-71" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79rs-7766-4ycf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15999?format=api", "vulnerability_id": "VCID-y2t3-3pyp-tbd2", "summary": "OpenStack Swift metadata constraints are not correctly enforced\nOpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0835.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0836.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7960.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53037", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53032", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53101", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53029", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53002", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53064", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53049", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53069", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52995", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52944", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52993", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53033", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53025", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52954", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53059", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.52978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.5297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00297", "scoring_system": "epss", "scoring_elements": "0.53015", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7960" }, { "reference_url": "https://bugs.launchpad.net/swift/+bug/1365350", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugs.launchpad.net/swift/+bug/1365350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7960" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96901" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openstack/swift", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift" }, { "reference_url": "https://github.com/openstack/swift/commit/06800cbe446ce4c937a57b69517b55c3bba9b6e1", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift/commit/06800cbe446ce4c937a57b69517b55c3bba9b6e1" }, { "reference_url": "https://github.com/openstack/swift/commit/2c4622a28ea04e1c6b2382189b0a1f6cccdc9c0f", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift/commit/2c4622a28ea04e1c6b2382189b0a1f6cccdc9c0f" }, { "reference_url": "https://github.com/openstack/swift/commit/5b2c27a5874c2b5b0a333e4955b03544f6a8119f", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/swift/commit/5b2c27a5874c2b5b0a333e4955b03544f6a8119f" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/07/39", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2014/10/07/39" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/08/7", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2014/10/08/7" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "reference_url": "http://www.securityfocus.com/bid/70279", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/70279" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2704-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ubuntu.com/usn/USN-2704-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150461", "reference_id": "1150461", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1150461" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7960", "reference_id": "CVE-2014-7960", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:P/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7960" }, { "reference_url": "https://github.com/advisories/GHSA-g6x3-55qv-x6p2", "reference_id": "GHSA-g6x3-55qv-x6p2", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-g6x3-55qv-x6p2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0835", "reference_id": "RHSA-2015:0835", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0835" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0836", "reference_id": "RHSA-2015:0836", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0836" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1495", "reference_id": "RHSA-2015:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1495" }, { "reference_url": "https://usn.ubuntu.com/2704-1/", "reference_id": "USN-2704-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2704-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-7960", "GHSA-g6x3-55qv-x6p2" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2t3-3pyp-tbd2" } ], "fixing_vulnerabilities": [], "risk_score": "4.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-keystoneclient@1:0.9.0-5%3Farch=el6ost" }