CVE & Exploit Intelligence Database

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,579 CVEs tracked 53,237 with exploits 4,709 exploited in wild 1,539 CISA KEV 3,914 Nuclei templates 37,790 vendors 42,457 researchers
9 results Clear all
CVE-2013-2167 9.8 CRITICAL EPSS 0.01
Openstack Python-keystoneclient < 0.2.5 - Data Authenticity Bypass
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass
CWE-345 Dec 10, 2019
CVE-2013-2166 9.8 CRITICAL EPSS 0.00
Openstack Python-keystoneclient < 0.2.5 - Weak Encryption
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
CWE-326 Dec 10, 2019
CVE-2013-2255 5.9 MEDIUM EPSS 0.00
Openstack Compute < 0.4.0 - Improper Certificate Validation
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.
CWE-295 Nov 01, 2019
CVE-2015-1852 EPSS 0.00
OpenStack keystonemiddleware <1.6.0/python-keystoneclient <1.4.0 - ...
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.
CWE-17 Apr 17, 2015
CVE-2014-7144 EPSS 0.00
OpenStack keystonemiddleware <0.11.0-1.2.0 - Man-in-the-Middle
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.
CWE-310 Oct 02, 2014
CVE-2014-0105 EPSS 0.00
OpenStack Python client <0.7.0 - Privilege Escalation
The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an "interaction between eventlet and python-memcached."
CWE-255 Apr 15, 2014
CVE-2013-2104 EPSS 0.01
Openstack Python-keystoneclient < 0.2.3 - Access Control
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
CWE-264 Jan 21, 2014
CVE-2013-2030 EPSS 0.00
Openstack Compute < 0.2.4 - Access Control
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
CWE-264 Dec 27, 2013
CVE-2013-2013 EPSS 0.00
Openstack Python-keystoneclient < 0.2.3 - Information Disclosure
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.
CWE-200 Oct 01, 2013