cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2013-1665,https://securityvulnerability.io/vulnerability/CVE-2013-1665,,"The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex and Folsom, Django, and possibly other products allow remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) attack.",Openstack,"Keystone Essex,Folsom",,,0.0028800000436604023,false,false,false,false,,false,false,2013-04-03T00:00:00.000Z,0 CVE-2013-1664,https://securityvulnerability.io/vulnerability/CVE-2013-1664,,"The XML libraries for Python 3.4, 3.3, 3.2, 3.1, 2.7, and 2.6, as used in OpenStack Keystone Essex, Folsom, and Grizzly; Compute (Nova) Essex and Folsom; Cinder Folsom; Django; and possibly other products allow remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack.",Openstack,"Cinder Folsom,Keystone Essex,Grizzly,Folsom,Compute \(nova\) Essex,Compute \(nova\) Folsom",,,0.09064000099897385,false,false,false,false,,false,false,2013-04-03T00:00:00.000Z,0 CVE-2012-3426,https://securityvulnerability.io/vulnerability/CVE-2012-3426,,"OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.",Openstack,"Essex,Keystone,Horizon",,,0.002050000010058284,false,false,false,false,,false,false,2012-07-31T10:00:00.000Z,0