Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/swift@1.4.8-2?distro=trixie
Typedeb
Namespacedebian
Nameswift
Version1.4.8-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.8.0-6
Latest_non_vulnerable_version2.37.1-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-wf91-36ce-hbcz
vulnerability_id VCID-wf91-36ce-hbcz
summary
OpenStack Object Storage (swift) Code Injection vulnerability
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1379.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2012-1379.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
3
reference_url https://access.redhat.com/errata/RHSA-2012:1379
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2012:1379
4
reference_url https://access.redhat.com/errata/RHSA-2013:0691
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2013:0691
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
6
reference_url https://access.redhat.com/security/cve/CVE-2012-4406
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-4406
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
reference_id
reference_type
scores
0
value 0.0471
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-18T12:55:00Z
1
value 0.0471
scoring_system epss
scoring_elements 0.89382
published_at 2026-04-21T12:55:00Z
2
value 0.0471
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-13T12:55:00Z
3
value 0.0471
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-12T12:55:00Z
4
value 0.0471
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-11T12:55:00Z
5
value 0.0471
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-09T12:55:00Z
6
value 0.0471
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-08T12:55:00Z
7
value 0.0471
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-07T12:55:00Z
8
value 0.0471
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-04T12:55:00Z
9
value 0.0471
scoring_system epss
scoring_elements 0.89333
published_at 2026-04-02T12:55:00Z
10
value 0.0471
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
8
reference_url https://bugs.launchpad.net/swift/+bug/1006414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1006414
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=854757
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=854757
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
12
reference_url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
13
reference_url https://launchpad.net/swift/+milestone/1.7.0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://launchpad.net/swift/+milestone/1.7.0
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
15
reference_url https://opendev.org/openstack/swift
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/swift
16
reference_url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/16
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/16
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/4
19
reference_url http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/55420
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
reference_id 686812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
29
reference_url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
reference_id GHSA-v7mh-3jgf-r26c
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
30
reference_url https://usn.ubuntu.com/1887-1/
reference_id USN-1887-1
reference_type
scores
url https://usn.ubuntu.com/1887-1/
fixed_packages
0
url pkg:deb/debian/swift@1.4.8-2?distro=trixie
purl pkg:deb/debian/swift@1.4.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.4.8-2%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2012-4406, GHSA-v7mh-3jgf-r26c
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wf91-36ce-hbcz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.4.8-2%3Fdistro=trixie