CVE & Exploit Intelligence Database

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
14 results Clear all
CVE-2022-47950 6.5 MEDIUM EPSS 0.00
OpenStack Swift <2.28.1-2.30.0 - Info Disclosure
An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
CWE-552 Jan 18, 2023
CVE-2017-8761 4.3 MEDIUM EPSS 0.00
Openstack Swift < 2.10.1 - Information Disclosure
In OpenStack Swift through 2.10.1, 2.11.0 through 2.13.0, and 2.14.0, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.
CWE-200 Jun 02, 2021
CVE-2017-16613 9.8 CRITICAL 1 Writeup EPSS 0.02
OpenStack Swauth <1.2.0 - Auth Bypass
An issue was discovered in middleware.py in OpenStack Swauth through 1.2.0 when used with OpenStack Swift through 2.15.1. The Swift object store and proxy server are saving (unhashed) tokens retrieved from the Swauth middleware authentication mechanism to a log file as part of a GET URI. This allows attackers to bypass authentication by inserting a token into an X-Auth-Token header of a new request. NOTE: github.com/openstack/swauth URLs do not mean that Swauth is maintained by an official OpenStack project team.
CWE-287 Nov 21, 2017
CVE-2016-0738 7.5 HIGH 1 Writeup EPSS 0.06
OpenStack Swift <2.3.1-2.5.1 - DoS
OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
CWE-399 Jan 29, 2016
CVE-2016-0737 7.5 HIGH EPSS 0.06
OpenStack Swift <2.4.0 - DoS
OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
CWE-399 Jan 29, 2016
CVE-2015-5223 EPSS 0.01
OpenStack Swift <2.4.0 - Info Disclosure
OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.
CWE-200 Oct 26, 2015
CVE-2015-1856 EPSS 0.01
Openstack Swift < 2.2.2 - Access Control
OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container.
CWE-264 Apr 17, 2015
CVE-2014-7960 EPSS 0.00
Openstack Swift < 2.1.0 - Resource Management Error
OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.
CWE-399 Oct 17, 2014
CVE-2014-3497 EPSS 0.00
Openstack Swift < 2.0.0 - XSS
Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header.
CWE-79 Jul 03, 2014
CVE-2013-6396 EPSS 0.00
Openstack Swift < 2.0 - Cryptographic Issue
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
CWE-310 Feb 18, 2014
CVE-2014-0006 EPSS 0.00
OpenStack Swift <1.8.0, <1.10.0, <1.11.0 - Info Disclosure
The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack.
CWE-200 Jan 23, 2014
CVE-2013-4155 EPSS 0.01
Openstack Folsom < 1.9.0 - Memory Corruption
OpenStack Swift before 1.9.1 in Folsom, Grizzly, and Havana allows authenticated users to cause a denial of service ("superfluous" tombstone consumption and Swift cluster slowdown) via a DELETE request with a timestamp that is older than expected.
CWE-119 Aug 20, 2013
CVE-2013-2161 EPSS 0.00
Openstack Folsom < 1.9.0 - Code Injection
XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.
CWE-94 Aug 20, 2013
CVE-2012-4406 9.8 CRITICAL EPSS 0.05
Openstack Swift < 1.7.0 - Insecure Deserialization
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
CWE-502 Oct 22, 2012