CVE & Exploit Intelligence Database

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,847 CVEs tracked 53,242 with exploits 4,725 exploited in wild 1,540 CISA KEV 3,918 Nuclei templates 37,802 vendors 42,493 researchers
43 results Clear all
CVE-2014-3476 EPSS 0.01
Openstack Keystone < 2013.2.4 - Improper Privilege Management
OpenStack Identity (Keystone) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 does not properly handle chained delegation, which allows remote authenticated users to gain privileges by leveraging a (1) trust or (2) OAuth token with impersonation enabled to create a new token with additional roles.
CWE-269 Jun 17, 2014
CVE-2013-2014 EPSS 0.02
Openstack Keystone < 2013.1 - Improper Input Validation
OpenStack Identity (Keystone) before 2013.1 allows remote attackers to cause a denial of service (memory consumption and crash) via multiple long requests.
CWE-20 Jun 02, 2014
CVE-2014-2828 EPSS 0.01
Openstack Keystone < 8.0.0a0 - Authentication Bypass
The V3 API in OpenStack Identity (Keystone) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 allows remote attackers to cause a denial of service (CPU consumption) via a large number of the same authentication method in a request, aka "authentication chaining."
CWE-287 Apr 15, 2014
CVE-2014-2237 EPSS 0.00
OpenStack Identity (Keystone) - Info Disclosure
The memcache token backend in OpenStack Identity (Keystone) 2013.1 through 2.013.1.4, 2013.2 through 2013.2.2, and icehouse before icehouse-3, when issuing a trust token with impersonation enabled, does not include this token in the trustee's token-index-list, which prevents the token from being invalidated by bulk token revocation and allows the trustee to bypass intended access restrictions.
CWE-264 Apr 01, 2014
CVE-2013-6391 EPSS 0.00
Openstack Keystone < 2013.2.1 - Improper Privilege Management
The ec2tokens API in OpenStack Identity (Keystone) before Havana 2013.2.1 and Icehouse before icehouse-2 does not return a trust-scoped token when one is received, which allows remote trust users to gain privileges by generating EC2 credentials from a trust-scoped token and using them in an ec2tokens API request.
CWE-269 Dec 14, 2013
CVE-2013-4477 EPSS 0.00
Openstack Grizzly < 8.0.0a0 - Access Control
The LDAP backend in OpenStack Identity (Keystone) Grizzly and Havana, when removing a role on a tenant for a user who does not have that role, adds the role to the user, which allows local users to gain privileges.
CWE-264 Nov 02, 2013
CVE-2013-4222 EPSS 0.01
Openstack Keystone < 2013.1.3 - Insufficiently Protected Credentials
OpenStack Identity (Keystone) Folsom, Grizzly 2013.1.3 and earlier, and Havana before havana-3 does not properly revoke user tokens when a tenant is disabled, which allows remote authenticated users to retain access via the token.
CWE-522 Sep 30, 2013
CVE-2013-4294 EPSS 0.01
Openstack Keystone < 2013.1.4 - Access Control
The (1) mamcache and (2) KVS token backends in OpenStack Identity (Keystone) Folsom 2012.2.x and Grizzly before 2013.1.4 do not properly compare the PKI token revocation list with PKI tokens, which allow remote attackers to bypass intended access restrictions via a revoked PKI token.
CWE-264 Sep 23, 2013
CVE-2013-2157 EPSS 0.00
Openstack Keystone < 2012.2.4 - Authentication Bypass
OpenStack Keystone Folsom, Grizzly before 2013.1.3, and Havana, when using LDAP with Anonymous binding, allows remote attackers to bypass authentication via an empty password.
CWE-287 Aug 20, 2013
CVE-2013-2059 EPSS 0.01
Openstack Keystone < 8.0.0a0 - Authentication Bypass
OpenStack Identity (Keystone) Folsom 2012.2.4 and earlier, Grizzly before 2013.1.1, and Havana does not immediately revoke the authentication token when deleting a user through the Keystone v2 API, which allows remote authenticated users to retain access via the token.
CWE-287 May 21, 2013
CVE-2013-2006 1 PoC Analysis EPSS 0.00
Openstack Keystone < 8.0.0a0 - Information Disclosure
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs the (1) admin_token and (2) LDAP password in plaintext, which allows local users to obtain sensitive by reading the log file.
CWE-200 May 21, 2013
CVE-2013-0282 EPSS 0.00
Openstack Keystone < 2012.1.3 - Authentication Bypass
OpenStack Keystone Grizzly before 2013.1, Folsom 2012.1.3 and earlier, and Essex does not properly check if the (1) user, (2) tenant, or (3) domain is enabled when using EC2-style authentication, which allows context-dependent attackers to bypass access restrictions.
CWE-287 Apr 12, 2013
CVE-2013-0270 1 Writeup EPSS 0.02
Openstack Keystone < 2012.1.3 - Memory Corruption
OpenStack Keystone Grizzly before 2013.1, Folsom, and possibly earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a large HTTP request, as demonstrated by a long tenant_name when requesting a token.
CWE-119 Apr 12, 2013
CVE-2013-1865 EPSS 0.01
Openstack Folsom < 2012.2.4 - Authentication Bypass
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keystone PKI tokens when done through a server, which allows remote attackers to bypass intended access restrictions via a revoked PKI token.
CWE-287 Mar 22, 2013
CVE-2013-0247 EPSS 0.03
Openstack Keystone < 2012.1.3 - Resource Management Error
OpenStack Keystone Essex 2012.1.3 and earlier, Folsom 2012.2.3 and earlier, and Grizzly grizzly-2 and earlier allows remote attackers to cause a denial of service (disk consumption) via many invalid token requests that trigger excessive generation of log entries.
CWE-399 Feb 24, 2013
CVE-2012-5483 EPSS 0.00
OpenStack Keystone 2012.1.3 - Info Disclosure
tools/sample_data.sh in OpenStack Keystone 2012.1.3, when access to Amazon Elastic Compute Cloud (Amazon EC2) is configured, uses world-readable permissions for /etc/keystone/ec2rc, which allows local users to obtain access to EC2 services by reading administrative access and secret values from this file.
CWE-264 Dec 26, 2012
CVE-2012-5571 EPSS 0.00
OpenStack Keystone Essex/Folsom - Auth Bypass
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens when the user role has been removed from a tenant, which allows remote authenticated users to bypass intended authorization restrictions by leveraging a token for the removed user role.
CWE-255 Dec 18, 2012
CVE-2012-5563 EPSS 0.00
OpenStack Keystone - Auth Bypass
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
CWE-255 Dec 18, 2012
CVE-2012-4457 EPSS 0.01
Openstack Keystone < 2012.1.2 - Authentication Bypass
OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-3 does not properly handle authorization tokens for disabled tenants, which allows remote authenticated users to access the tenant's resources by requesting a token for the tenant.
CWE-287 Oct 09, 2012
CVE-2012-4456 EPSS 0.04
Openstack Keystone < 2012.1.2 - Authentication Bypass
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
CWE-287 Oct 09, 2012