{"url":"http://public2.vulnerablecode.io/api/packages/121486?format=json","purl":"pkg:rpm/redhat/python-django-horizon@2013.2.3-3?arch=el6ost","type":"rpm","namespace":"redhat","name":"python-django-horizon","version":"2013.2.3-3","qualifiers":{"arch":"el6ost"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15172?format=json","vulnerability_id":"VCID-dsg5-s5y9-nbe3","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nCross-site scripting (XSS) vulnerability in the Orchestration/Stack section in the Horizon Orchestration dashboard in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2, when used with Heat, allows remote Orchestration template owners or catalogs to inject arbitrary web script or HTML via a crafted template.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0939","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:0939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1188","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:1188"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3473","reference_id":"","reference_type":"","scores":[{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60838","published_at":"2026-05-14T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60739","published_at":"2026-04-21T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.6074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60734","published_at":"2026-05-07T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60791","published_at":"2026-05-09T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60752","published_at":"2026-05-11T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60779","published_at":"2026-05-12T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60577","published_at":"2026-04-01T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.6068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60738","published_at":"2026-04-11T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60725","published_at":"2026-04-12T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60749","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3473"},{"reference_url":"https://bugs.launchpad.net/horizon/+bug/1308727","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.launchpad.net/horizon/+bug/1308727"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116090","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3473"},{"reference_url":"https://github.com/openstack/horizon/commit/c844bd692894353c60b320005b804970605e910f","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/openstack/horizon/commit/c844bd692894353c60b320005b804970605e910f"},{"reference_url":"https://github.com/openstack/horizon/commit/de4466d88b816437fb29eff5ab23b9b964cd3985","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/openstack/horizon/commit/de4466d88b816437fb29eff5ab23b9b964cd3985"},{"reference_url":"https://opendev.org/openstack/horizon","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://opendev.org/openstack/horizon"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/08/6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2014/07/08/6"},{"reference_url":"http://www.securityfocus.com/bid/68459","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/68459"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754255","reference_id":"754255","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754255"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2014-3473","reference_id":"CVE-2014-3473","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2014-3473"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3473","reference_id":"CVE-2014-3473","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3473"},{"reference_url":"https://github.com/advisories/GHSA-8vwv-2v7v-jmgr","reference_id":"GHSA-8vwv-2v7v-jmgr","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-8vwv-2v7v-jmgr"},{"reference_url":"https://usn.ubuntu.com/2323-1/","reference_id":"USN-2323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2323-1/"}],"fixed_packages":[],"aliases":["CVE-2014-3473","GHSA-8vwv-2v7v-jmgr"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dsg5-s5y9-nbe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86214?format=json","vulnerability_id":"VCID-n2fx-xctw-r7fr","summary":"openstack-horizon: multiple XSS flaws","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8578.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8578.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8578","reference_id":"","reference_type":"","scores":[{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.5471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54771","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54821","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.5479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54828","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54788","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54807","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54827","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54814","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8578"},{"reference_url":"https://bugs.launchpad.net/horizon/+bug/1320235","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/horizon/+bug/1320235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8578","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8578"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/08/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/08/6"},{"reference_url":"http://www.securityfocus.com/bid/68456","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68456"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8578","reference_id":"CVE-2014-8578","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8578"}],"fixed_packages":[],"aliases":["CVE-2014-8578"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n2fx-xctw-r7fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15071?format=json","vulnerability_id":"VCID-rc85-fmv7-6fh8","summary":"OpenStack Dashboard (Horizon) Cross-site scripting (XSS) vulnerability in the Host Aggregates interface\nCross-site scripting (XSS) vulnerability in the Host Aggregates interface in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-3 allows remote administrators to inject arbitrary web script or HTML via a new host aggregate name.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1335.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1335.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1336.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1336.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1188","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:1188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1335","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:1335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1336","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:1336"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3594.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3594","reference_id":"","reference_type":"","scores":[{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69615","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69691","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69793","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69743","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69718","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69747","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69716","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69563","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69541","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69592","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69631","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3594"},{"reference_url":"https://bugs.launchpad.net/horizon/+bug/1349491","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.launchpad.net/horizon/+bug/1349491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1129774","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1129774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3594"},{"reference_url":"http://seclists.org/oss-sec/2014/q3/413","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/oss-sec/2014/q3/413"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95378","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/95378"},{"reference_url":"https://github.com/openstack/horizon/commit/ba2c98aea0db0d03200c811b86b3efe8367f3905","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/openstack/horizon/commit/ba2c98aea0db0d03200c811b86b3efe8367f3905"},{"reference_url":"https://github.com/openstack/horizon/commit/ba908ae88d5925f4f6783eb234cc4ea95017472b","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/openstack/horizon/commit/ba908ae88d5925f4f6783eb234cc4ea95017472b"},{"reference_url":"https://review.openstack.org/#/c/115310","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://review.openstack.org/#/c/115310"},{"reference_url":"https://review.openstack.org/#/c/115311","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://review.openstack.org/#/c/115311"},{"reference_url":"https://review.openstack.org/#/c/115313","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://review.openstack.org/#/c/115313"},{"reference_url":"https://review.openstack.org/#/c/115313/","reference_id":"","reference_type":"","scores":[],"url":"https://review.openstack.org/#/c/115313/"},{"reference_url":"http://www.securityfocus.com/bid/69291","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/69291"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758930","reference_id":"758930","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=758930"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:juno-2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2014-3594","reference_id":"CVE-2014-3594","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2014-3594"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3594","reference_id":"CVE-2014-3594","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3594"},{"reference_url":"https://github.com/advisories/GHSA-8g68-2hcj-h8vg","reference_id":"GHSA-8g68-2hcj-h8vg","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-8g68-2hcj-h8vg"},{"reference_url":"https://usn.ubuntu.com/2323-1/","reference_id":"USN-2323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2323-1/"}],"fixed_packages":[],"aliases":["CVE-2014-3594","GHSA-8g68-2hcj-h8vg"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rc85-fmv7-6fh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86213?format=json","vulnerability_id":"VCID-tngh-mgyc-xka4","summary":"openstack-horizon: multiple XSS flaws","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3475","reference_id":"","reference_type":"","scores":[{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58217","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58021","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58127","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58156","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.5816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58152","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58132","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58163","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58118","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58103","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58064","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58167","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58147","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3475"},{"reference_url":"https://bugs.launchpad.net/horizon/+bug/1320235","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/horizon/+bug/1320235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3475"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/08/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/08/6"},{"reference_url":"http://www.securityfocus.com/bid/68456","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68456"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754255","reference_id":"754255","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754255"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3475","reference_id":"CVE-2014-3475","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3475"},{"reference_url":"https://usn.ubuntu.com/2323-1/","reference_id":"USN-2323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2323-1/"}],"fixed_packages":[],"aliases":["CVE-2014-3475"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tngh-mgyc-xka4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15213?format=json","vulnerability_id":"VCID-zxjy-82n2-mkdb","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nCross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00040.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0939","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:0939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1188","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:1188"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3474.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3474.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3474","reference_id":"","reference_type":"","scores":[{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53694","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53634","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53617","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53642","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53604","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53536","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53582","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53597","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53623","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53561","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00303","scoring_system":"epss","scoring_elements":"0.53606","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3474"},{"reference_url":"https://bugs.launchpad.net/horizon/+bug/1322197","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugs.launchpad.net/horizon/+bug/1322197"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116090","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1116090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3474","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3474"},{"reference_url":"https://github.com/openstack/horizon/commit/32a7b713468161282f2ea01d5e2faff980d924cd","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/openstack/horizon/commit/32a7b713468161282f2ea01d5e2faff980d924cd"},{"reference_url":"https://github.com/openstack/horizon/commit/c844bd692894353c60b320005b804970605e910f","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/openstack/horizon/commit/c844bd692894353c60b320005b804970605e910f"},{"reference_url":"https://github.com/openstack/horizon/commit/de4466d88b816437fb29eff5ab23b9b964cd3985","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/openstack/horizon/commit/de4466d88b816437fb29eff5ab23b9b964cd3985"},{"reference_url":"https://opendev.org/openstack/horizon","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://opendev.org/openstack/horizon"},{"reference_url":"https://review.opendev.org/c/openstack/horizon/+/105476","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://review.opendev.org/c/openstack/horizon/+/105476"},{"reference_url":"https://review.openstack.org/#/c/105477","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://review.openstack.org/#/c/105477"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/08/6","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2014/07/08/6"},{"reference_url":"http://www.securityfocus.com/bid/68460","reference_id":"","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/68460"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754255","reference_id":"754255","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754255"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2014-3474","reference_id":"CVE-2014-3474","reference_type":"","scores":[{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2014-3474"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3474","reference_id":"CVE-2014-3474","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:N"},{"value":"LOW","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3474"},{"reference_url":"https://github.com/advisories/GHSA-j57p-g33w-95c5","reference_id":"GHSA-j57p-g33w-95c5","reference_type":"","scores":[{"value":"LOW","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-j57p-g33w-95c5"},{"reference_url":"https://usn.ubuntu.com/2323-1/","reference_id":"USN-2323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2323-1/"}],"fixed_packages":[],"aliases":["CVE-2014-3474","GHSA-j57p-g33w-95c5"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxjy-82n2-mkdb"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-django-horizon@2013.2.3-3%3Farch=el6ost"}