Количество 5
Количество 5
CVE-2012-5563
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
CVE-2012-5563
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
CVE-2012-5563
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression.
CVE-2012-5563
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not prope ...
GHSA-w66p-78g4-mr7g
OpenStack Keystone Insufficient token expiration
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2012-5563 OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. | CVSS2: 4 | 0% Низкий | около 13 лет назад | |
CVE-2012-5563 OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. | CVSS2: 4 | 0% Низкий | около 13 лет назад | |
CVE-2012-5563 OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by creating new tokens through token chaining. NOTE: this issue exists because of a CVE-2012-3426 regression. | CVSS2: 4 | 0% Низкий | около 13 лет назад | |
CVE-2012-5563 OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not prope ... | CVSS2: 4 | 0% Низкий | около 13 лет назад | |
GHSA-w66p-78g4-mr7g OpenStack Keystone Insufficient token expiration | CVSS3: 5.9 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу