{"id":2888073,"name":"python-keystoneclient","ecosystem":"pypi","description":"Client Library for OpenStack Identity","homepage":"https://docs.openstack.org/python-keystoneclient/latest/","licenses":"Apache Software License","normalized_licenses":["Apache-2.0"],"repository_url":null,"keywords_array":[],"namespace":null,"versions_count":98,"first_release_published_at":"2012-06-29T21:50:45.000Z","latest_release_published_at":"2026-02-27T15:36:23.000Z","latest_release_number":"5.8.0","last_synced_at":"2026-04-13T04:12:18.209Z","created_at":"2022-04-10T12:21:06.864Z","updated_at":"2026-04-13T18:12:25.591Z","registry_url":"https://pypi.org/project/python-keystoneclient/","install_command":"pip install python-keystoneclient --index-url https://pypi.org/simple","documentation_url":"https://python-keystoneclient.readthedocs.io/","metadata":{"funding":null,"documentation":null,"classifiers":["Environment :: OpenStack","Intended Audience :: Information Technology","Intended Audience :: System Administrators","License :: OSI Approved :: Apache Software License","Operating System :: POSIX :: Linux","Programming Language :: Python","Programming Language :: Python :: 3","Programming Language :: Python :: 3.10","Programming Language :: Python :: 3.11","Programming Language :: Python :: 3.12"],"normalized_name":"python-keystoneclient","project_status":null},"repo_metadata":{},"repo_metadata_updated_at":"2024-11-10T18:54:50.446Z","dependent_packages_count":121,"downloads":1013943,"downloads_period":"last-month","dependent_repos_count":3159,"rankings":{"downloads":0.21853088766069423,"dependent_repos_count":0.1864442499416175,"dependent_packages_count":0.1458138329482304,"stargazers_count":null,"forks_count":null,"docker_downloads_count":0.4674396571856031,"average":0.2545571569340363},"purl":"pkg:pypi/python-keystoneclient","advisories":[{"uuid":"GSA_kwCzR0hTQS00cnJyLWo3ZmYtcjg0NM4AAezp","url":"https://github.com/advisories/GHSA-4rrr-j7ff-r844","title":"python-keystoneclient missing expiration check in PKI token validation ","description":"python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.","origin":"UNSPECIFIED","severity":"HIGH","published_at":"2022-05-17T04:54:13.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":8.7,"cvss_vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N","references":["https://nvd.nist.gov/vuln/detail/CVE-2013-2104","https://bugs.launchpad.net/python-keystoneclient/+bug/1179615","http://lists.opensuse.org/opensuse-updates/2013-06/msg00198.html","http://rhn.redhat.com/errata/RHSA-2013-0944.html","http://www.openwall.com/lists/oss-security/2013/05/28/7","http://www.ubuntu.com/usn/USN-1851-1","http://www.ubuntu.com/usn/USN-1875-1","https://access.redhat.com/errata/RHSA-2013:0944","https://access.redhat.com/security/cve/CVE-2013-2104","https://bugzilla.redhat.com/show_bug.cgi?id=965852","https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2014-69.yaml","https://github.com/advisories/GHSA-4rrr-j7ff-r844"],"source_kind":"github","identifiers":["GHSA-4rrr-j7ff-r844","CVE-2013-2104"],"repository_url":null,"blast_radius":30.446081745374794,"created_at":"2023-08-29T19:05:25.613Z","updated_at":"2026-04-13T18:07:50.748Z","epss_percentage":0.00769,"epss_percentile":0.73514,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00cnJyLWo3ZmYtcjg0NM4AAezp","html_url":"https://advisories.ecosyste.ms/advisories/GSA_kwCzR0hTQS00cnJyLWo3ZmYtcjg0NM4AAezp","packages":[{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"0.2.4","vulnerable_version_range":"\u003c 0.2.4"}],"purl":"pkg:pypi/python-keystoneclient"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00cnJyLWo3ZmYtcjg0NM4AAezp/related_packages","related_advisories":[]},{"uuid":"GSA_kwCzR0hTQS1weHh2LXJ2MzItMnFnds4AAekt","url":"https://github.com/advisories/GHSA-pxxv-rv32-2qgv","title":"OpenStack Nova uses insecure keystone middleware tmpdir by default","description":"keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.","origin":"UNSPECIFIED","severity":"MODERATE","published_at":"2022-05-17T04:44:52.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":4.3,"cvss_vector":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N","references":["https://nvd.nist.gov/vuln/detail/CVE-2013-2030","https://bugs.launchpad.net/nova/+bug/1174608","https://bugzilla.redhat.com/show_bug.cgi?id=958285","http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105916.html","http://lists.openstack.org/pipermail/openstack-announce/2013-May/000098.html","http://www.openwall.com/lists/oss-security/2013/05/09/2","https://github.com/openstack/nova/commit/58d6879b1caaa750c39c8e452a0634c24ffef2ce","https://github.com/openstack/nova/commit/74aa04e2ca7942cb1e1a86dcbaffeb72d260ccd7","https://github.com/openstack/nova/commit/7bf3e8d3e254d817ff5ae7ef1f2884b10410ca60","https://github.com/openstack/python-keystoneclient/commit/1736e2ffb12f70eeebed019448bc14def48aa036","https://github.com/pypa/advisory-database/tree/main/vulns/nova/PYSEC-2013-45.yaml","https://github.com/advisories/GHSA-pxxv-rv32-2qgv"],"source_kind":"github","identifiers":["GHSA-pxxv-rv32-2qgv","CVE-2013-2030"],"repository_url":"https://github.com/openstack/nova","blast_radius":0.0,"created_at":"2023-08-29T00:05:32.462Z","updated_at":"2026-04-13T18:07:51.865Z","epss_percentage":0.00035,"epss_percentile":0.10489,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1weHh2LXJ2MzItMnFnds4AAekt","html_url":"https://advisories.ecosyste.ms/advisories/GSA_kwCzR0hTQS1weHh2LXJ2MzItMnFnds4AAekt","packages":[{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"0.2.4","vulnerable_version_range":"\u003c 0.2.4"}],"purl":"pkg:pypi/python-keystoneclient"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1weHh2LXJ2MzItMnFnds4AAekt/related_packages","related_advisories":[]},{"uuid":"GSA_kwCzR0hTQS1wOXdxLW1qaDgtcTcybc4AAcZh","url":"https://github.com/advisories/GHSA-p9wq-mjh8-q72m","title":"OpenStack keystonemiddleware and python-keystoneclient vulnerable to man-in-the-middle attacks","description":"The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystoneclient before 1.4.0 disables certification verification when the \"insecure\" option is set in a paste configuration (paste.ini) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted certificate, a different vulnerability than CVE-2014-7144.","origin":"UNSPECIFIED","severity":"HIGH","published_at":"2022-05-17T03:17:26.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":8.7,"cvss_vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N","references":["https://nvd.nist.gov/vuln/detail/CVE-2015-1852","https://bugs.launchpad.net/keystonemiddleware/+bug/1411063","http://lists.openstack.org/pipermail/openstack-announce/2015-April/000350.html","http://rhn.redhat.com/errata/RHSA-2015-1677.html","http://rhn.redhat.com/errata/RHSA-2015-1685.html","http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html","http://www.ubuntu.com/usn/USN-2705-1","https://access.redhat.com/errata/RHSA-2015:1677","https://access.redhat.com/errata/RHSA-2015:1685","https://access.redhat.com/security/cve/CVE-2015-1852","https://bugzilla.redhat.com/show_bug.cgi?id=1209527","https://web.archive.org/web/20200228060649/http://www.securityfocus.com/bid/74187","https://github.com/pypa/advisory-database/tree/main/vulns/keystonemiddleware/PYSEC-2015-30.yaml","https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2015-31.yaml","https://github.com/advisories/GHSA-p9wq-mjh8-q72m"],"source_kind":"github","identifiers":["GHSA-p9wq-mjh8-q72m","CVE-2015-1852"],"repository_url":null,"blast_radius":30.446081745374794,"created_at":"2023-02-08T19:03:16.191Z","updated_at":"2026-04-10T16:04:04.330Z","epss_percentage":0.00219,"epss_percentile":0.44542,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wOXdxLW1qaDgtcTcybc4AAcZh","html_url":"https://advisories.ecosyste.ms/advisories/GSA_kwCzR0hTQS1wOXdxLW1qaDgtcTcybc4AAcZh","packages":[{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"1.4.0","vulnerable_version_range":"\u003c 1.4.0"}],"purl":"pkg:pypi/python-keystoneclient"},{"ecosystem":"pypi","package_name":"keystonemiddleware","versions":[{"first_patched_version":"1.6.0","vulnerable_version_range":"\u003c 1.6.0"}],"purl":"pkg:pypi/keystonemiddleware"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1wOXdxLW1qaDgtcTcybc4AAcZh/related_packages","related_advisories":[]},{"uuid":"GSA_kwCzR0hTQS04cTJtLXB3eGYtamM3Z84AAY6T","url":"https://github.com/advisories/GHSA-8q2m-pwxf-jc7g","title":"python-keystoneclient unsecure user password update","description":"The user-password-update command in python-keystoneclient before 0.2.4 accepts the new password in the --password argument, which allows local users to obtain sensitive information by listing the process.","origin":"UNSPECIFIED","severity":"LOW","published_at":"2022-05-17T00:55:33.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":2.9,"cvss_vector":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","references":["https://nvd.nist.gov/vuln/detail/CVE-2013-2013","https://bugs.launchpad.net/python-keystoneclient/+bug/938315","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16937","http://www.openwall.com/lists/oss-security/2013/05/23/4","https://github.com/openstack/python-keystoneclient/commit/f2e0818bc97bfbeba83f6abbb07909a8debcad77","https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2013-24.yaml","https://github.com/advisories/GHSA-8q2m-pwxf-jc7g"],"source_kind":"github","identifiers":["GHSA-8q2m-pwxf-jc7g","CVE-2013-2013"],"repository_url":"https://github.com/openstack/python-keystoneclient","blast_radius":0.0,"created_at":"2023-08-04T22:05:01.395Z","updated_at":"2026-04-05T20:08:28.233Z","epss_percentage":0.00065,"epss_percentile":0.20493,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04cTJtLXB3eGYtamM3Z84AAY6T","html_url":"https://advisories.ecosyste.ms/advisories/GSA_kwCzR0hTQS04cTJtLXB3eGYtamM3Z84AAY6T","packages":[{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"0.2.4","vulnerable_version_range":"\u003c 0.2.4"}],"purl":"pkg:pypi/python-keystoneclient"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04cTJtLXB3eGYtamM3Z84AAY6T/related_packages","related_advisories":[]},{"uuid":"GSA_kwCzR0hTQS1nd3ZxLXJncWYtOTkzZs4AAX-q","url":"https://github.com/advisories/GHSA-gwvq-rgqf-993f","title":"python-keystoneclient vulnerable to context confusion in Keystone auth_token middleware","description":"A context confusion vulnerability was identified in Keystone auth_token middleware (shipped in python-keystoneclient) before 0.7.0. By doing repeated requests, with sufficient load on the target system, an authenticated user may in certain situations assume another authenticated user's complete identity and multi-tenant authorizations, potentially resulting in a privilege escalation. Note that it is related to a bad interaction between eventlet and python-memcached that should be avoided if the calling process already monkey-patches \"thread\" to use eventlet. Only keystone middleware setups using auth_token with memcache are vulnerable.","origin":"UNSPECIFIED","severity":"LOW","published_at":"2022-05-17T00:13:54.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":2.3,"cvss_vector":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L","references":["https://nvd.nist.gov/vuln/detail/CVE-2014-0105","https://bugs.launchpad.net/python-keystoneclient/+bug/1282865","http://rhn.redhat.com/errata/RHSA-2014-0382.html","http://rhn.redhat.com/errata/RHSA-2014-0409.html","http://www.openwall.com/lists/oss-security/2014/03/27/4","https://review.opendev.org/c/openstack/python-keystoneclient/+/81078","https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2014-70.yaml","https://github.com/advisories/GHSA-gwvq-rgqf-993f"],"source_kind":"github","identifiers":["GHSA-gwvq-rgqf-993f","CVE-2014-0105"],"repository_url":null,"blast_radius":8.048964139581843,"created_at":"2023-08-04T00:05:00.778Z","updated_at":"2026-04-05T20:08:29.493Z","epss_percentage":0.00371,"epss_percentile":0.58507,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nd3ZxLXJncWYtOTkzZs4AAX-q","html_url":"https://advisories.ecosyste.ms/advisories/GSA_kwCzR0hTQS1nd3ZxLXJncWYtOTkzZs4AAX-q","packages":[{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"0.7.0","vulnerable_version_range":"\u003c= 0.6.0"}],"purl":"pkg:pypi/python-keystoneclient"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nd3ZxLXJncWYtOTkzZs4AAX-q/related_packages","related_advisories":[]},{"uuid":"GSA_kwCzR0hTQS1xaDJ4LWhwZjktY2YyZ83gDQ","url":"https://github.com/advisories/GHSA-qh2x-hpf9-cf2g","title":"OpenStack Keystone and other components vulnerable to Improper Certificate Validation","description":"HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.","origin":"UNSPECIFIED","severity":"MODERATE","published_at":"2022-05-05T00:28:57.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":5.9,"cvss_vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N","references":["https://nvd.nist.gov/vuln/detail/CVE-2013-2255","https://access.redhat.com/security/cve/cve-2013-2255","https://bugs.launchpad.net/ossn/+bug/1188189","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2255","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2255","https://exchange.xforce.ibmcloud.com/vulnerabilities/85562","https://security-tracker.debian.org/tracker/CVE-2013-2255","https://github.com/openstack/cinder/commit/0f9652d92e175a1f7dc3c2a37ab444b8f189375a","https://github.com/openstack/keystone/commit/5bd4c2984d329625a2a8442b316fa235dbb88a3d","https://github.com/openstack/neutron/commit/7255e056092f034daaeb4246a812900645d46911","https://github.com/openstack/python-keystoneclient/commit/20e166fd8a943ee3f91ba362a47e9c14c7cc5f4c","https://web.archive.org/web/20200229073508/https://www.securityfocus.com/bid/61118","https://github.com/advisories/GHSA-qh2x-hpf9-cf2g"],"source_kind":"github","identifiers":["GHSA-qh2x-hpf9-cf2g","CVE-2013-2255"],"repository_url":"https://github.com/openstack/cinder","blast_radius":0.0,"created_at":"2024-05-02T14:05:36.566Z","updated_at":"2026-04-05T20:05:16.923Z","epss_percentage":0.00414,"epss_percentile":0.61562,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xaDJ4LWhwZjktY2YyZ83gDQ","html_url":"https://advisories.ecosyste.ms/advisories/GSA_kwCzR0hTQS1xaDJ4LWhwZjktY2YyZ83gDQ","packages":[{"ecosystem":"pypi","package_name":"keystone","versions":[{"first_patched_version":"8.0.0a0","vulnerable_version_range":"\u003c 8.0.0a0"}],"purl":"pkg:pypi/keystone"},{"ecosystem":"pypi","package_name":"neutron","versions":[{"first_patched_version":"7.0.0a0","vulnerable_version_range":"\u003c 7.0.0a0"}],"purl":"pkg:pypi/neutron"},{"ecosystem":"pypi","package_name":"cinder","versions":[{"first_patched_version":"7.0.0a0","vulnerable_version_range":"\u003c 7.0.0a0"}],"purl":"pkg:pypi/cinder"},{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"0.4.0","vulnerable_version_range":"\u003c 0.4.0"}],"purl":"pkg:pypi/python-keystoneclient"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1xaDJ4LWhwZjktY2YyZ83gDQ/related_packages","related_advisories":[]},{"uuid":"GSA_kwCzR0hTQS1jM3hxLWNqOGYtNzgyOc0WdQ","url":"https://github.com/advisories/GHSA-c3xq-cj8f-7829","title":"Inadequate Encryption Strength in python-keystoneclient","description":"python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass.","origin":"UNSPECIFIED","severity":"CRITICAL","published_at":"2021-10-12T16:31:43.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":9.3,"cvss_vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","references":["https://nvd.nist.gov/vuln/detail/CVE-2013-2166","https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e","https://access.redhat.com/security/cve/cve-2013-2166","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166","https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166","https://security-tracker.debian.org/tracker/CVE-2013-2166","http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html","http://rhn.redhat.com/errata/RHSA-2013-0992.html","http://www.openwall.com/lists/oss-security/2013/06/19/5","https://github.com/advisories/GHSA-c3xq-cj8f-7829","https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2019-197.yaml"],"source_kind":"github","identifiers":["GHSA-c3xq-cj8f-7829","CVE-2013-2166"],"repository_url":"https://github.com/openstack/python-keystoneclient","blast_radius":32.54581152091789,"created_at":"2022-12-21T16:12:32.360Z","updated_at":"2026-04-05T20:03:58.546Z","epss_percentage":0.00087,"epss_percentile":0.25486,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jM3hxLWNqOGYtNzgyOc0WdQ","html_url":"https://advisories.ecosyste.ms/advisories/GSA_kwCzR0hTQS1jM3hxLWNqOGYtNzgyOc0WdQ","packages":[{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"0.3.0","vulnerable_version_range":"\u003e= 0.2.3, \u003c= 0.2.5"}],"purl":"pkg:pypi/python-keystoneclient"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1jM3hxLWNqOGYtNzgyOc0WdQ/related_packages","related_advisories":[]},{"uuid":"MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTl2ZzMtY2Y5Mi1oMmg3","url":"https://github.com/advisories/GHSA-9vg3-cf92-h2h7","title":"Insufficient Verification of Data Authenticity in python-keystoneclient","description":"python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass","origin":"UNSPECIFIED","severity":"CRITICAL","published_at":"2020-03-10T20:39:05.000Z","withdrawn_at":null,"classification":"GENERAL","cvss_score":9.3,"cvss_vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","references":["https://nvd.nist.gov/vuln/detail/CVE-2013-2167","https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e","https://access.redhat.com/security/cve/cve-2013-2167","https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-2167","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2167","https://exchange.xforce.ibmcloud.com/vulnerabilities/85492","https://github.com/openstack/python-keystoneclient/commits/0.3.0","https://security-tracker.debian.org/tracker/CVE-2013-2167","http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html","http://rhn.redhat.com/errata/RHSA-2013-0992.html","http://www.openwall.com/lists/oss-security/2013/06/19/5","https://github.com/advisories/GHSA-9vg3-cf92-h2h7","https://github.com/pypa/advisory-database/tree/main/vulns/python-keystoneclient/PYSEC-2019-161.yaml"],"source_kind":"github","identifiers":["GHSA-9vg3-cf92-h2h7","CVE-2013-2167"],"repository_url":"https://github.com/openstack/python-keystoneclient","blast_radius":32.54581152091789,"created_at":"2022-12-21T16:12:32.351Z","updated_at":"2026-04-05T20:03:58.554Z","epss_percentage":0.00826,"epss_percentile":0.73748,"api_url":"https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTl2ZzMtY2Y5Mi1oMmg3","html_url":"https://advisories.ecosyste.ms/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTl2ZzMtY2Y5Mi1oMmg3","packages":[{"ecosystem":"pypi","package_name":"python-keystoneclient","versions":[{"first_patched_version":"0.3.0","vulnerable_version_range":"\u003e= 0.2.3, \u003c= 0.2.5"}],"purl":"pkg:pypi/python-keystoneclient"}],"related_packages_url":"https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTl2ZzMtY2Y5Mi1oMmg3/related_packages","related_advisories":[]}],"docker_usage_url":"https://docker.ecosyste.ms/usage/pypi/python-keystoneclient","docker_dependents_count":152,"docker_downloads_count":5309176,"usage_url":"https://repos.ecosyste.ms/usage/pypi/python-keystoneclient","dependent_repositories_url":"https://repos.ecosyste.ms/api/v1/usage/pypi/python-keystoneclient/dependencies","status":null,"funding_links":[],"critical":null,"issue_metadata":null,"versions_url":"https://packages.ecosyste.ms/api/v1/registries/pypi.org/packages/python-keystoneclient/versions","version_numbers_url":"https://packages.ecosyste.ms/api/v1/registries/pypi.org/packages/python-keystoneclient/version_numbers","dependent_packages_url":"https://packages.ecosyste.ms/api/v1/registries/pypi.org/packages/python-keystoneclient/dependent_packages","related_packages_url":"https://packages.ecosyste.ms/api/v1/registries/pypi.org/packages/python-keystoneclient/related_packages","codemeta_url":"https://packages.ecosyste.ms/api/v1/registries/pypi.org/packages/python-keystoneclient/codemeta","maintainers":[{"uuid":"openstackci","login":"openstackci","name":null,"email":null,"url":null,"packages_count":741,"html_url":"https://pypi.org/user/openstackci/","role":null,"created_at":"2023-02-24T03:08:01.630Z","updated_at":"2023-02-24T03:08:01.630Z","packages_url":"https://packages.ecosyste.ms/api/v1/registries/pypi.org/maintainers/openstackci/packages"}]}