{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86168?format=json","vulnerability_id":"VCID-9vq2-2nsa-bbfa","summary":"openstack-nova: Nova VMware driver may connect VNC to another tenant's console","aliases":[{"alias":"CVE-2014-8750"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/932869?format=json","purl":"pkg:deb/debian/nova@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/932857?format=json","purl":"pkg:deb/debian/nova@2:22.0.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hd9e-1msb-uqa6"},{"vulnerability":"VCID-m5vc-4my3-87gk"},{"vulnerability":"VCID-zwuz-pgjz-rkb9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:22.0.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/932855?format=json","purl":"pkg:deb/debian/nova@2:26.2.2-1~deb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:26.2.2-1~deb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/932909?format=json","purl":"pkg:deb/debian/nova@2:26.2.2-1~deb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:26.2.2-1~deb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/932860?format=json","purl":"pkg:deb/debian/nova@2:31.0.0-6%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:31.0.0-6%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/932858?format=json","purl":"pkg:deb/debian/nova@2:33.0.0~rc1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0~rc1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/932859?format=json","purl":"pkg:deb/debian/nova@2:33.0.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1000461?format=json","purl":"pkg:deb/debian/nova@2:33.0.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1041985?format=json","purl":"pkg:deb/debian/nova@2:33.0.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1066837?format=json","purl":"pkg:deb/debian/nova@2:33.0.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088711?format=json","purl":"pkg:deb/debian/nova@2:33.0.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/nova@2:33.0.1-1%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/121516?format=json","purl":"pkg:rpm/redhat/openstack-nova@2013.2.4-2?arch=el6ost","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-9vq2-2nsa-bbfa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@2013.2.4-2%3Farch=el6ost"},{"url":"http://public2.vulnerablecode.io/api/packages/121268?format=json","purl":"pkg:rpm/redhat/openstack-nova@2014.1.3-4?arch=el6ost","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8p6b-qw5m-jfha"},{"vulnerability":"VCID-9vq2-2nsa-bbfa"},{"vulnerability":"VCID-x5k4-dm9d-xkf7"},{"vulnerability":"VCID-ykzj-fz7y-eug8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@2014.1.3-4%3Farch=el6ost"},{"url":"http://public2.vulnerablecode.io/api/packages/121269?format=json","purl":"pkg:rpm/redhat/openstack-nova@2014.1.3-4?arch=el7ost","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8p6b-qw5m-jfha"},{"vulnerability":"VCID-9vq2-2nsa-bbfa"},{"vulnerability":"VCID-x5k4-dm9d-xkf7"},{"vulnerability":"VCID-ykzj-fz7y-eug8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-nova@2014.1.3-4%3Farch=el7ost"}],"references":[{"reference_url":"http://lists.openstack.org/pipermail/openstack-announce/2014-October/000293.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.openstack.org/pipermail/openstack-announce/2014-October/000293.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1689.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1689.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1781.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1781.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1782.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1782.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8750.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8750","reference_id":"","reference_type":"","scores":[{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76294","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76281","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.7602","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76108","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76084","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76081","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76121","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76126","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76109","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76148","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76158","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76169","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76179","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76209","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76232","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76218","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00929","scoring_system":"epss","scoring_elements":"0.76233","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8750"},{"reference_url":"https://bugs.launchpad.net/nova/+bug/1357372","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/nova/+bug/1357372"},{"reference_url":"http://secunia.com/advisories/60227","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60227"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/10/14/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/10/14/9"},{"reference_url":"http://www.securityfocus.com/bid/70182","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70182"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152346","reference_id":"1152346","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1152346"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:2014.2:milestone1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:nova:2014.2:milestone1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:2014.2:milestone1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:2014.2:milestone2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:nova:2014.2:milestone2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:2014.2:milestone2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:2014.2:milestone3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openstack:nova:2014.2:milestone3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:nova:2014.2:milestone3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8750","reference_id":"CVE-2014-8750","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-8750"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1689","reference_id":"RHSA-2014:1689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1689"}],"weaknesses":[{"cwe_id":367,"name":"Time-of-check Time-of-use (TOCTOU) Race Condition","description":"The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state."},{"cwe_id":285,"name":"Improper Authorization","description":"The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action."},{"cwe_id":362,"name":"Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","description":"The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently."}],"exploits":[],"severity_range_score":"6.0 - 6.5","exploitability":"0.5","weighted_severity":"5.9","risk_score":3.0,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9vq2-2nsa-bbfa"}