Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/python-werkzeug@2.2.2-3%2Bdeb12u1
Typedeb
Namespacedebian
Namepython-werkzeug
Version2.2.2-3+deb12u1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-qjcy-54yn-qybs
vulnerability_id VCID-qjcy-54yn-qybs
summary
Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain
The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34069.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34069.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34069
reference_id
reference_type
scores
0
value 0.38929
scoring_system epss
scoring_elements 0.97276
published_at 2026-04-18T12:55:00Z
1
value 0.38929
scoring_system epss
scoring_elements 0.97273
published_at 2026-04-16T12:55:00Z
2
value 0.38929
scoring_system epss
scoring_elements 0.97266
published_at 2026-04-13T12:55:00Z
3
value 0.38929
scoring_system epss
scoring_elements 0.97265
published_at 2026-04-12T12:55:00Z
4
value 0.38929
scoring_system epss
scoring_elements 0.97264
published_at 2026-04-11T12:55:00Z
5
value 0.38929
scoring_system epss
scoring_elements 0.97261
published_at 2026-04-09T12:55:00Z
6
value 0.38929
scoring_system epss
scoring_elements 0.9726
published_at 2026-04-08T12:55:00Z
7
value 0.38929
scoring_system epss
scoring_elements 0.97253
published_at 2026-04-07T12:55:00Z
8
value 0.38929
scoring_system epss
scoring_elements 0.97247
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34069
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34069
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pallets/werkzeug
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pallets/werkzeug
5
reference_url https://github.com/pallets/werkzeug/commit/3386395b24c7371db11a5b8eaac0c91da5362692
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:54:35Z/
url https://github.com/pallets/werkzeug/commit/3386395b24c7371db11a5b8eaac0c91da5362692
6
reference_url https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:54:35Z/
url https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985
7
reference_url https://lists.debian.org/debian-lts-announce/2025/02/msg00026.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/02/msg00026.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4SH32AM3CTPMAAEOIDAN7VU565LO4IR
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4SH32AM3CTPMAAEOIDAN7VU565LO4IR
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFERFN7PINV4MOGMGA3DPIXJPDCYOEJZ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFERFN7PINV4MOGMGA3DPIXJPDCYOEJZ
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-34069
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-34069
11
reference_url https://security.netapp.com/advisory/ntap-20240614-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240614-0004
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070711
reference_id 1070711
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1070711
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2279451
reference_id 2279451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2279451
14
reference_url https://github.com/advisories/GHSA-2g68-c3qc-8985
reference_id GHSA-2g68-c3qc-8985
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2g68-c3qc-8985
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4SH32AM3CTPMAAEOIDAN7VU565LO4IR/
reference_id H4SH32AM3CTPMAAEOIDAN7VU565LO4IR
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:54:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4SH32AM3CTPMAAEOIDAN7VU565LO4IR/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFERFN7PINV4MOGMGA3DPIXJPDCYOEJZ/
reference_id HFERFN7PINV4MOGMGA3DPIXJPDCYOEJZ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:54:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HFERFN7PINV4MOGMGA3DPIXJPDCYOEJZ/
17
reference_url https://security.netapp.com/advisory/ntap-20240614-0004/
reference_id ntap-20240614-0004
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:54:35Z/
url https://security.netapp.com/advisory/ntap-20240614-0004/
18
reference_url https://access.redhat.com/errata/RHSA-2024:10696
reference_id RHSA-2024:10696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10696
19
reference_url https://access.redhat.com/errata/RHSA-2024:5107
reference_id RHSA-2024:5107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5107
20
reference_url https://access.redhat.com/errata/RHSA-2024:5439
reference_id RHSA-2024:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5439
21
reference_url https://access.redhat.com/errata/RHSA-2024:5810
reference_id RHSA-2024:5810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5810
22
reference_url https://access.redhat.com/errata/RHSA-2024:6016
reference_id RHSA-2024:6016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6016
23
reference_url https://access.redhat.com/errata/RHSA-2024:9975
reference_id RHSA-2024:9975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9975
24
reference_url https://access.redhat.com/errata/RHSA-2024:9976
reference_id RHSA-2024:9976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9976
25
reference_url https://access.redhat.com/errata/RHSA-2025:4664
reference_id RHSA-2025:4664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4664
26
reference_url https://access.redhat.com/errata/RHSA-2025:9340
reference_id RHSA-2025:9340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9340
27
reference_url https://usn.ubuntu.com/6799-1/
reference_id USN-6799-1
reference_type
scores
url https://usn.ubuntu.com/6799-1/
fixed_packages
0
url pkg:deb/debian/python-werkzeug@2.2.2-3%2Bdeb12u1
purl pkg:deb/debian/python-werkzeug@2.2.2-3%2Bdeb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-werkzeug@2.2.2-3%252Bdeb12u1
aliases CVE-2024-34069, GHSA-2g68-c3qc-8985
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjcy-54yn-qybs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/python-werkzeug@2.2.2-3%252Bdeb12u1