cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2015-1852,https://securityvulnerability.io/vulnerability/CVE-2015-1852,,"The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the ""insecure"" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.",Openstack,"Keystonemiddleware,Python-keystoneclient",,,0.0038499999791383743,false,false,false,false,,false,false,2015-04-17T17:00:00.000Z,0 CVE-2014-7144,https://securityvulnerability.io/vulnerability/CVE-2014-7144,,"OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the ""insecure"" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate.",Openstack,"Keystonemiddleware,Python-keystoneclient",,,0.0026400000788271427,false,false,false,false,,false,false,2014-10-02T14:00:00.000Z,0 CVE-2014-0105,https://securityvulnerability.io/vulnerability/CVE-2014-0105,,"The auth_token middleware in the OpenStack Python client library for Keystone (aka python-keystoneclient) before 0.7.0 does not properly retrieve user tokens from memcache, which allows remote authenticated users to gain privileges in opportunistic circumstances via a large number of requests, related to an ""interaction between eventlet and python-memcached.""",Openstack,Python-keystoneclient,,,0.0028899998869746923,false,false,false,false,,false,false,2014-04-15T14:00:00.000Z,0 CVE-2013-2104,https://securityvulnerability.io/vulnerability/CVE-2013-2104,,"python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.",Openstack,Python-keystoneclient,,,0.0034000000450760126,false,false,false,false,,false,false,2014-01-21T18:00:00.000Z,0 CVE-2013-2013,https://securityvulnerability.io/vulnerability/CVE-2013-2013,,"The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.",Openstack,Python-keystoneclient,,,0.0004199999966658652,false,false,false,false,,false,false,2013-10-01T20:00:00.000Z,0