Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rhdh-hub@container-1?arch=3-138
Typerpm
Namespaceredhat
Namerhdh-hub
Versioncontainer-1
Qualifiers
arch 3-138
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2xgj-yjdf-nqeh
vulnerability_id VCID-2xgj-yjdf-nqeh
summary
path-to-regexp contains a ReDoS
### Impact

The regular expression that is vulnerable to backtracking can be generated in versions before 0.1.12 of `path-to-regexp`, originally reported in CVE-2024-45296

### Patches

Upgrade to 0.1.12.

### Workarounds

Avoid using two parameters within a single path segment, when the separator is not `.` (e.g. no `/:a-:b`). Alternatively, you can define the regex used for both parameters and ensure they do not overlap to allow backtracking.

### References

- https://github.com/advisories/GHSA-9wv6-86v2-598j
- https://blakeembrey.com/posts/2024-09-web-redos/
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52798.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52798.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52798
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44056
published_at 2026-04-24T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44133
published_at 2026-04-21T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44203
published_at 2026-04-18T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44213
published_at 2026-04-16T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44152
published_at 2026-04-13T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44151
published_at 2026-04-12T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44184
published_at 2026-04-11T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44169
published_at 2026-04-09T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44166
published_at 2026-04-08T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.44115
published_at 2026-04-07T12:55:00Z
10
value 0.00216
scoring_system epss
scoring_elements 0.44183
published_at 2026-04-04T12:55:00Z
11
value 0.00216
scoring_system epss
scoring_elements 0.4416
published_at 2026-04-02T12:55:00Z
12
value 0.00293
scoring_system epss
scoring_elements 0.52656
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52798
2
reference_url https://blakeembrey.com/posts/2024-09-web-redos
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://blakeembrey.com/posts/2024-09-web-redos
3
reference_url https://github.com/pillarjs/path-to-regexp
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pillarjs/path-to-regexp
4
reference_url https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-09T14:53:29Z/
url https://github.com/pillarjs/path-to-regexp/commit/f01c26a013b1889f0c217c643964513acf17f6a4
5
reference_url https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-09T14:53:29Z/
url https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-rhx6-c78j-4q9w
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-52798
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-52798
7
reference_url https://security.netapp.com/advisory/ntap-20250124-0002
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 7.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250124-0002
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2330689
reference_id 2330689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2330689
9
reference_url https://github.com/advisories/GHSA-rhx6-c78j-4q9w
reference_id GHSA-rhx6-c78j-4q9w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rhx6-c78j-4q9w
10
reference_url https://access.redhat.com/errata/RHSA-2025:0775
reference_id RHSA-2025:0775
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0775
11
reference_url https://access.redhat.com/errata/RHSA-2025:0783
reference_id RHSA-2025:0783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0783
12
reference_url https://access.redhat.com/errata/RHSA-2025:0875
reference_id RHSA-2025:0875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0875
13
reference_url https://access.redhat.com/errata/RHSA-2025:0876
reference_id RHSA-2025:0876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0876
14
reference_url https://access.redhat.com/errata/RHSA-2025:1051
reference_id RHSA-2025:1051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1051
15
reference_url https://access.redhat.com/errata/RHSA-2025:1448
reference_id RHSA-2025:1448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1448
16
reference_url https://access.redhat.com/errata/RHSA-2025:3368
reference_id RHSA-2025:3368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3368
17
reference_url https://access.redhat.com/errata/RHSA-2025:3374
reference_id RHSA-2025:3374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3374
18
reference_url https://access.redhat.com/errata/RHSA-2025:3397
reference_id RHSA-2025:3397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3397
fixed_packages
aliases CVE-2024-52798, GHSA-rhx6-c78j-4q9w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xgj-yjdf-nqeh
1
url VCID-8vr3-83b4-hqd2
vulnerability_id VCID-8vr3-83b4-hqd2
summary
Jinja has a sandbox breakout through indirect reference to format method
An oversight in how the Jinja sandboxed environment detects calls to `str.format` allows an attacker that controls the content of a template to execute arbitrary Python code.

To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates.

Jinja's sandbox does catch calls to `str.format` and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's `format` method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56326.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56326.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-56326
reference_id
reference_type
scores
0
value 0.00336
scoring_system epss
scoring_elements 0.56465
published_at 2026-04-13T12:55:00Z
1
value 0.00336
scoring_system epss
scoring_elements 0.56484
published_at 2026-04-12T12:55:00Z
2
value 0.00336
scoring_system epss
scoring_elements 0.56508
published_at 2026-04-11T12:55:00Z
3
value 0.00336
scoring_system epss
scoring_elements 0.56498
published_at 2026-04-16T12:55:00Z
4
value 0.00336
scoring_system epss
scoring_elements 0.56493
published_at 2026-04-08T12:55:00Z
5
value 0.00336
scoring_system epss
scoring_elements 0.56442
published_at 2026-04-07T12:55:00Z
6
value 0.00336
scoring_system epss
scoring_elements 0.5646
published_at 2026-04-04T12:55:00Z
7
value 0.00336
scoring_system epss
scoring_elements 0.56438
published_at 2026-04-02T12:55:00Z
8
value 0.00456
scoring_system epss
scoring_elements 0.63948
published_at 2026-04-26T12:55:00Z
9
value 0.00456
scoring_system epss
scoring_elements 0.63929
published_at 2026-04-18T12:55:00Z
10
value 0.00456
scoring_system epss
scoring_elements 0.6392
published_at 2026-04-21T12:55:00Z
11
value 0.00456
scoring_system epss
scoring_elements 0.63936
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-56326
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pallets/jinja
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pallets/jinja
5
reference_url https://github.com/pallets/jinja/commit/48b0687e05a5466a91cd5812d604fa37ad0943b4
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-27T17:50:50Z/
url https://github.com/pallets/jinja/commit/48b0687e05a5466a91cd5812d604fa37ad0943b4
6
reference_url https://github.com/pallets/jinja/releases/tag/3.1.5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-27T17:50:50Z/
url https://github.com/pallets/jinja/releases/tag/3.1.5
7
reference_url https://github.com/pallets/jinja/security/advisories/GHSA-q2x7-8rv6-6q7h
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-27T17:50:50Z/
url https://github.com/pallets/jinja/security/advisories/GHSA-q2x7-8rv6-6q7h
8
reference_url https://lists.debian.org/debian-lts-announce/2025/04/msg00022.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/04/msg00022.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-56326
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-56326
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091331
reference_id 1091331
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091331
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333856
reference_id 2333856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333856
12
reference_url https://github.com/advisories/GHSA-q2x7-8rv6-6q7h
reference_id GHSA-q2x7-8rv6-6q7h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q2x7-8rv6-6q7h
13
reference_url https://access.redhat.com/errata/RHSA-2025:0308
reference_id RHSA-2025:0308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0308
14
reference_url https://access.redhat.com/errata/RHSA-2025:0335
reference_id RHSA-2025:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0335
15
reference_url https://access.redhat.com/errata/RHSA-2025:0338
reference_id RHSA-2025:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0338
16
reference_url https://access.redhat.com/errata/RHSA-2025:0341
reference_id RHSA-2025:0341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0341
17
reference_url https://access.redhat.com/errata/RHSA-2025:0345
reference_id RHSA-2025:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0345
18
reference_url https://access.redhat.com/errata/RHSA-2025:0656
reference_id RHSA-2025:0656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0656
19
reference_url https://access.redhat.com/errata/RHSA-2025:0667
reference_id RHSA-2025:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0667
20
reference_url https://access.redhat.com/errata/RHSA-2025:0711
reference_id RHSA-2025:0711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0711
21
reference_url https://access.redhat.com/errata/RHSA-2025:0721
reference_id RHSA-2025:0721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0721
22
reference_url https://access.redhat.com/errata/RHSA-2025:0722
reference_id RHSA-2025:0722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0722
23
reference_url https://access.redhat.com/errata/RHSA-2025:0753
reference_id RHSA-2025:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0753
24
reference_url https://access.redhat.com/errata/RHSA-2025:0777
reference_id RHSA-2025:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0777
25
reference_url https://access.redhat.com/errata/RHSA-2025:0834
reference_id RHSA-2025:0834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0834
26
reference_url https://access.redhat.com/errata/RHSA-2025:0842
reference_id RHSA-2025:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0842
27
reference_url https://access.redhat.com/errata/RHSA-2025:0850
reference_id RHSA-2025:0850
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0850
28
reference_url https://access.redhat.com/errata/RHSA-2025:0875
reference_id RHSA-2025:0875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0875
29
reference_url https://access.redhat.com/errata/RHSA-2025:0883
reference_id RHSA-2025:0883
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0883
30
reference_url https://access.redhat.com/errata/RHSA-2025:0950
reference_id RHSA-2025:0950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0950
31
reference_url https://access.redhat.com/errata/RHSA-2025:0951
reference_id RHSA-2025:0951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0951
32
reference_url https://access.redhat.com/errata/RHSA-2025:0978
reference_id RHSA-2025:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0978
33
reference_url https://access.redhat.com/errata/RHSA-2025:1101
reference_id RHSA-2025:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1101
34
reference_url https://access.redhat.com/errata/RHSA-2025:1109
reference_id RHSA-2025:1109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1109
35
reference_url https://access.redhat.com/errata/RHSA-2025:1118
reference_id RHSA-2025:1118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1118
36
reference_url https://access.redhat.com/errata/RHSA-2025:1123
reference_id RHSA-2025:1123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1123
37
reference_url https://access.redhat.com/errata/RHSA-2025:1130
reference_id RHSA-2025:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1130
38
reference_url https://access.redhat.com/errata/RHSA-2025:1241
reference_id RHSA-2025:1241
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1241
39
reference_url https://access.redhat.com/errata/RHSA-2025:1250
reference_id RHSA-2025:1250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1250
40
reference_url https://access.redhat.com/errata/RHSA-2025:1710
reference_id RHSA-2025:1710
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1710
41
reference_url https://access.redhat.com/errata/RHSA-2025:2399
reference_id RHSA-2025:2399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2399
42
reference_url https://access.redhat.com/errata/RHSA-2025:2612
reference_id RHSA-2025:2612
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2612
43
reference_url https://access.redhat.com/errata/RHSA-2025:2700
reference_id RHSA-2025:2700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2700
44
reference_url https://access.redhat.com/errata/RHSA-2025:3374
reference_id RHSA-2025:3374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3374
45
reference_url https://access.redhat.com/errata/RHSA-2025:4576
reference_id RHSA-2025:4576
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4576
46
reference_url https://usn.ubuntu.com/7244-1/
reference_id USN-7244-1
reference_type
scores
url https://usn.ubuntu.com/7244-1/
47
reference_url https://usn.ubuntu.com/7343-1/
reference_id USN-7343-1
reference_type
scores
url https://usn.ubuntu.com/7343-1/
fixed_packages
aliases CVE-2024-56326, GHSA-q2x7-8rv6-6q7h
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vr3-83b4-hqd2
2
url VCID-jyfq-pjwy-n7gg
vulnerability_id VCID-jyfq-pjwy-n7gg
summary
Jinja has a sandbox breakout through malicious filenames
A bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used.

To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56201.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-56201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-56201
reference_id
reference_type
scores
0
value 0.00459
scoring_system epss
scoring_elements 0.6409
published_at 2026-04-26T12:55:00Z
1
value 0.00459
scoring_system epss
scoring_elements 0.64077
published_at 2026-04-24T12:55:00Z
2
value 0.00459
scoring_system epss
scoring_elements 0.64058
published_at 2026-04-21T12:55:00Z
3
value 0.00459
scoring_system epss
scoring_elements 0.64071
published_at 2026-04-18T12:55:00Z
4
value 0.00459
scoring_system epss
scoring_elements 0.64059
published_at 2026-04-16T12:55:00Z
5
value 0.00459
scoring_system epss
scoring_elements 0.64024
published_at 2026-04-13T12:55:00Z
6
value 0.00459
scoring_system epss
scoring_elements 0.64054
published_at 2026-04-12T12:55:00Z
7
value 0.00459
scoring_system epss
scoring_elements 0.64068
published_at 2026-04-11T12:55:00Z
8
value 0.00459
scoring_system epss
scoring_elements 0.64039
published_at 2026-04-08T12:55:00Z
9
value 0.00459
scoring_system epss
scoring_elements 0.63988
published_at 2026-04-07T12:55:00Z
10
value 0.00459
scoring_system epss
scoring_elements 0.64056
published_at 2026-04-09T12:55:00Z
11
value 0.00459
scoring_system epss
scoring_elements 0.64029
published_at 2026-04-04T12:55:00Z
12
value 0.00459
scoring_system epss
scoring_elements 0.64001
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-56201
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/pallets/jinja
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pallets/jinja
4
reference_url https://github.com/pallets/jinja/commit/767b23617628419ae3709ccfb02f9602ae9fe51f
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-24T01:44:55Z/
url https://github.com/pallets/jinja/commit/767b23617628419ae3709ccfb02f9602ae9fe51f
5
reference_url https://github.com/pallets/jinja/issues/1792
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-24T01:44:55Z/
url https://github.com/pallets/jinja/issues/1792
6
reference_url https://github.com/pallets/jinja/releases/tag/3.1.5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-24T01:44:55Z/
url https://github.com/pallets/jinja/releases/tag/3.1.5
7
reference_url https://github.com/pallets/jinja/security/advisories/GHSA-gmj6-6f8f-6699
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-24T01:44:55Z/
url https://github.com/pallets/jinja/security/advisories/GHSA-gmj6-6f8f-6699
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-56201
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value 5.4
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-56201
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091329
reference_id 1091329
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091329
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333854
reference_id 2333854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333854
11
reference_url https://github.com/advisories/GHSA-gmj6-6f8f-6699
reference_id GHSA-gmj6-6f8f-6699
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gmj6-6f8f-6699
12
reference_url https://access.redhat.com/errata/RHSA-2025:0308
reference_id RHSA-2025:0308
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0308
13
reference_url https://access.redhat.com/errata/RHSA-2025:0335
reference_id RHSA-2025:0335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0335
14
reference_url https://access.redhat.com/errata/RHSA-2025:0338
reference_id RHSA-2025:0338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0338
15
reference_url https://access.redhat.com/errata/RHSA-2025:0341
reference_id RHSA-2025:0341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0341
16
reference_url https://access.redhat.com/errata/RHSA-2025:0345
reference_id RHSA-2025:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0345
17
reference_url https://access.redhat.com/errata/RHSA-2025:0656
reference_id RHSA-2025:0656
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0656
18
reference_url https://access.redhat.com/errata/RHSA-2025:0721
reference_id RHSA-2025:0721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0721
19
reference_url https://access.redhat.com/errata/RHSA-2025:0722
reference_id RHSA-2025:0722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0722
20
reference_url https://access.redhat.com/errata/RHSA-2025:0753
reference_id RHSA-2025:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0753
21
reference_url https://access.redhat.com/errata/RHSA-2025:0777
reference_id RHSA-2025:0777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0777
22
reference_url https://access.redhat.com/errata/RHSA-2025:0834
reference_id RHSA-2025:0834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0834
23
reference_url https://access.redhat.com/errata/RHSA-2025:0842
reference_id RHSA-2025:0842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0842
24
reference_url https://access.redhat.com/errata/RHSA-2025:0875
reference_id RHSA-2025:0875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0875
25
reference_url https://access.redhat.com/errata/RHSA-2025:1101
reference_id RHSA-2025:1101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1101
26
reference_url https://access.redhat.com/errata/RHSA-2025:1118
reference_id RHSA-2025:1118
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1118
27
reference_url https://access.redhat.com/errata/RHSA-2025:1123
reference_id RHSA-2025:1123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1123
28
reference_url https://access.redhat.com/errata/RHSA-2025:1130
reference_id RHSA-2025:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1130
29
reference_url https://access.redhat.com/errata/RHSA-2025:3368
reference_id RHSA-2025:3368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3368
30
reference_url https://access.redhat.com/errata/RHSA-2025:3374
reference_id RHSA-2025:3374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3374
31
reference_url https://access.redhat.com/errata/RHSA-2025:3397
reference_id RHSA-2025:3397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3397
32
reference_url https://access.redhat.com/errata/RHSA-2025:3491
reference_id RHSA-2025:3491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3491
33
reference_url https://usn.ubuntu.com/7244-1/
reference_id USN-7244-1
reference_type
scores
url https://usn.ubuntu.com/7244-1/
34
reference_url https://usn.ubuntu.com/7343-1/
reference_id USN-7343-1
reference_type
scores
url https://usn.ubuntu.com/7343-1/
fixed_packages
aliases CVE-2024-56201, GHSA-gmj6-6f8f-6699
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jyfq-pjwy-n7gg
3
url VCID-s6f3-3mxh-ekfr
vulnerability_id VCID-s6f3-3mxh-ekfr
summary
Predictable results in nanoid generation when given non-integer values
When nanoid is called with a fractional value, there were a number of undesirable effects:

1. in browser and non-secure, the code infinite loops on while (size--)
2. in node, the value of poolOffset becomes fractional, causing calls to nanoid to return zeroes until the pool is next filled
3. if the first call in node is a fractional argument, the initial buffer allocation fails with an error

Version 3.3.8 and 5.0.9 are fixed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-55565.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-55565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-55565
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.2863
published_at 2026-04-26T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.29001
published_at 2026-04-11T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28741
published_at 2026-04-24T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.2886
published_at 2026-04-21T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28906
published_at 2026-04-18T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28931
published_at 2026-04-16T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28907
published_at 2026-04-13T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.29028
published_at 2026-04-02T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.29078
published_at 2026-04-04T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28887
published_at 2026-04-07T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28955
published_at 2026-04-08T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28997
published_at 2026-04-09T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.28956
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-55565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55565
3
reference_url https://github.com/ai/nanoid
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ai/nanoid
4
reference_url https://github.com/ai/nanoid/compare/3.3.7...3.3.8
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T17:19:45Z/
url https://github.com/ai/nanoid/compare/3.3.7...3.3.8
5
reference_url https://github.com/ai/nanoid/pull/510
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T17:19:45Z/
url https://github.com/ai/nanoid/pull/510
6
reference_url https://github.com/ai/nanoid/releases/tag/5.0.9
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T17:19:45Z/
url https://github.com/ai/nanoid/releases/tag/5.0.9
7
reference_url https://lists.debian.org/debian-lts-announce/2024/12/msg00025.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/12/msg00025.html
8
reference_url https://lists.debian.org/debian-lts-announce/2025/01/msg00006.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/01/msg00006.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-55565
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-55565
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331063
reference_id 2331063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331063
11
reference_url https://github.com/advisories/GHSA-mwcw-c2x4-8c55
reference_id GHSA-mwcw-c2x4-8c55
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mwcw-c2x4-8c55
12
reference_url https://access.redhat.com/errata/RHSA-2024:10990
reference_id RHSA-2024:10990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10990
13
reference_url https://access.redhat.com/errata/RHSA-2025:0079
reference_id RHSA-2025:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0079
14
reference_url https://access.redhat.com/errata/RHSA-2025:0082
reference_id RHSA-2025:0082
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0082
15
reference_url https://access.redhat.com/errata/RHSA-2025:0340
reference_id RHSA-2025:0340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0340
16
reference_url https://access.redhat.com/errata/RHSA-2025:0654
reference_id RHSA-2025:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0654
17
reference_url https://access.redhat.com/errata/RHSA-2025:0723
reference_id RHSA-2025:0723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0723
18
reference_url https://access.redhat.com/errata/RHSA-2025:0778
reference_id RHSA-2025:0778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0778
19
reference_url https://access.redhat.com/errata/RHSA-2025:0785
reference_id RHSA-2025:0785
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0785
20
reference_url https://access.redhat.com/errata/RHSA-2025:0851
reference_id RHSA-2025:0851
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0851
21
reference_url https://access.redhat.com/errata/RHSA-2025:0875
reference_id RHSA-2025:0875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0875
22
reference_url https://access.redhat.com/errata/RHSA-2025:0892
reference_id RHSA-2025:0892
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0892
23
reference_url https://access.redhat.com/errata/RHSA-2025:1051
reference_id RHSA-2025:1051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1051
24
reference_url https://access.redhat.com/errata/RHSA-2025:1448
reference_id RHSA-2025:1448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1448
25
reference_url https://access.redhat.com/errata/RHSA-2025:2652
reference_id RHSA-2025:2652
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2652
26
reference_url https://access.redhat.com/errata/RHSA-2025:3368
reference_id RHSA-2025:3368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3368
27
reference_url https://access.redhat.com/errata/RHSA-2025:3374
reference_id RHSA-2025:3374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3374
28
reference_url https://access.redhat.com/errata/RHSA-2025:3397
reference_id RHSA-2025:3397
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3397
29
reference_url https://access.redhat.com/errata/RHSA-2026:2737
reference_id RHSA-2026:2737
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2737
30
reference_url https://access.redhat.com/errata/RHSA-2026:3406
reference_id RHSA-2026:3406
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3406
fixed_packages
aliases CVE-2024-55565, GHSA-mwcw-c2x4-8c55
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s6f3-3mxh-ekfr
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhdh-hub@container-1%3Farch=3-138