Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/15506?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15506?format=api", "vulnerability_id": "VCID-8p6b-qw5m-jfha", "summary": "OpenStack Oslo utility sensitive information exposure via log files\nThe strutils.mask_password function in the OpenStack Oslo utility library, Cinder, Nova, and Trove before 2013.2.4 and 2014.1 before 2014.1.3 does not properly mask passwords when logging commands, which allows local users to obtain passwords by reading the log.", "aliases": [ { "alias": "CVE-2014-7231" }, { "alias": "GHSA-v933-vx5p-j7w2" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/936682?format=api", "purl": "pkg:deb/debian/python-oslo.utils@0.2.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-oslo.utils@0.2.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/936683?format=api", "purl": "pkg:deb/debian/python-oslo.utils@4.6.0-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-oslo.utils@4.6.0-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/936681?format=api", "purl": "pkg:deb/debian/python-oslo.utils@6.0.1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-oslo.utils@6.0.1-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/936686?format=api", "purl": "pkg:deb/debian/python-oslo.utils@8.2.0-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-oslo.utils@8.2.0-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/936684?format=api", "purl": "pkg:deb/debian/python-oslo.utils@9.1.0-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-oslo.utils@9.1.0-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/936685?format=api", "purl": "pkg:deb/debian/python-oslo.utils@10.0.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-oslo.utils@10.0.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1067615?format=api", "purl": "pkg:deb/debian/python-oslo.utils@10.0.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-oslo.utils@10.0.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/28438?format=api", "purl": "pkg:pypi/oslo-utils@0.2.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ed1c-yhw8-hfh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/oslo-utils@0.2.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/82343?format=api", "purl": "pkg:pypi/oslo.utils@0.2.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/oslo.utils@0.2.0" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/28436?format=api", "purl": "pkg:pypi/oslo-utils@0.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8p6b-qw5m-jfha" }, { "vulnerability": "VCID-ed1c-yhw8-hfh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/oslo-utils@0.1.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/28437?format=api", "purl": "pkg:pypi/oslo-utils@0.1.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8p6b-qw5m-jfha" }, { "vulnerability": "VCID-ed1c-yhw8-hfh8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/oslo-utils@0.1.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/121266?format=api", "purl": "pkg:rpm/redhat/openstack-cinder@2014.1.3-1?arch=el6ost", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8p6b-qw5m-jfha" }, { "vulnerability": "VCID-ea21-seng-n3fw" }, { "vulnerability": "VCID-ykzj-fz7y-eug8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-cinder@2014.1.3-1%3Farch=el6ost" }, { "url": "http://public2.vulnerablecode.io/api/packages/121267?format=api", "purl": "pkg:rpm/redhat/openstack-cinder@2014.1.3-1?arch=el7ost", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8p6b-qw5m-jfha" }, { "vulnerability": "VCID-ea21-seng-n3fw" }, { "vulnerability": "VCID-ykzj-fz7y-eug8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-cinder@2014.1.3-1%3Farch=el7ost" }, { "url": "http://public2.vulnerablecode.io/api/packages/121268?format=api", "purl": "pkg:rpm/redhat/openstack-nova@2014.1.3-4?arch=el6ost", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8p6b-qw5m-jfha" }, { "vulnerability": "VCID-9vq2-2nsa-bbfa" }, { "vulnerability": "VCID-x5k4-dm9d-xkf7" }, { "vulnerability": "VCID-ykzj-fz7y-eug8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@2014.1.3-4%3Farch=el6ost" }, { "url": "http://public2.vulnerablecode.io/api/packages/121269?format=api", "purl": "pkg:rpm/redhat/openstack-nova@2014.1.3-4?arch=el7ost", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8p6b-qw5m-jfha" }, { "vulnerability": "VCID-9vq2-2nsa-bbfa" }, { "vulnerability": "VCID-x5k4-dm9d-xkf7" }, { "vulnerability": "VCID-ykzj-fz7y-eug8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@2014.1.3-4%3Farch=el7ost" }, { "url": "http://public2.vulnerablecode.io/api/packages/121572?format=api", "purl": "pkg:rpm/redhat/openstack-trove@2014.1.3-1?arch=el7ost", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8p6b-qw5m-jfha" }, { "vulnerability": "VCID-ykzj-fz7y-eug8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-trove@2014.1.3-1%3Farch=el7ost" } ], "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1939.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1939.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7231.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7231.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7231", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3601", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36446", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36218", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36188", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36101", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.35984", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36051", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36078", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.35987", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36588", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36621", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36457", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36509", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36528", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.365", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3652", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36502", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7231" }, { "reference_url": "https://bugs.launchpad.net/oslo.utils/+bug/1345233", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugs.launchpad.net/oslo.utils/+bug/1345233" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7231" }, { "reference_url": "http://seclists.org/oss-sec/2014/q3/853", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/oss-sec/2014/q3/853" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96726", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96726" }, { "reference_url": "https://github.com/openstack/oslo.utils", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openstack/oslo.utils" }, { "reference_url": "http://www.securityfocus.com/bid/70184", "reference_id": "", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/70184" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147722", "reference_id": "1147722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147722" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cinder:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:cinder:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:cinder:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:trove:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openstack:trove:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:trove:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7231", "reference_id": "CVE-2014-7231", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "LOW", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7231" }, { "reference_url": "https://github.com/advisories/GHSA-v933-vx5p-j7w2", "reference_id": "GHSA-v933-vx5p-j7w2", "reference_type": "", "scores": [ { "value": "LOW", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-v933-vx5p-j7w2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1939", "reference_id": "RHSA-2014:1939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1939" } ], "weaknesses": [ { "cwe_id": 200, "name": "Exposure of Sensitive Information to an Unauthorized Actor", "description": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 184, "name": "Incomplete List of Disallowed Inputs", "description": "The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses." }, { "cwe_id": 532, "name": "Insertion of Sensitive Information into Log File", "description": "Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information." }, { "cwe_id": 522, "name": "Insufficiently Protected Credentials", "description": "The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval." } ], "exploits": [], "severity_range_score": "0.1 - 3", "exploitability": "0.5", "weighted_severity": "2.7", "risk_score": 1.4, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8p6b-qw5m-jfha" }