Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
Typedeb
Namespacedebian
Nameswift
Version2.26.0-10+deb11u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.30.0-4
Latest_non_vulnerable_version2.37.1-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1k44-tzfw-pkhw
vulnerability_id VCID-1k44-tzfw-pkhw
summary
OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service
A memory-leak issue was found in OpenStack Object Storage (swift), in the client-to-proxy connection. An OpenStack-authenticated attacker could remotely trigger this flaw to cause denial of service through excess memory consumption.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-0128.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0128.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-0155.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0155.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0329.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0329.html
3
reference_url https://access.redhat.com/errata/RHSA-2016:0126
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0126
4
reference_url https://access.redhat.com/errata/RHSA-2016:0127
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0127
5
reference_url https://access.redhat.com/errata/RHSA-2016:0128
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0128
6
reference_url https://access.redhat.com/errata/RHSA-2016:0155
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0155
7
reference_url https://access.redhat.com/errata/RHSA-2016:0328
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0328
8
reference_url https://access.redhat.com/errata/RHSA-2016:0329
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0329
9
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0737.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0737.json
10
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0737
reference_id
reference_type
scores
0
value 0.05795
scoring_system epss
scoring_elements 0.90523
published_at 2026-04-21T12:55:00Z
1
value 0.05795
scoring_system epss
scoring_elements 0.90466
published_at 2026-04-01T12:55:00Z
2
value 0.05795
scoring_system epss
scoring_elements 0.9047
published_at 2026-04-02T12:55:00Z
3
value 0.05795
scoring_system epss
scoring_elements 0.90482
published_at 2026-04-04T12:55:00Z
4
value 0.05795
scoring_system epss
scoring_elements 0.90487
published_at 2026-04-07T12:55:00Z
5
value 0.05795
scoring_system epss
scoring_elements 0.90499
published_at 2026-04-08T12:55:00Z
6
value 0.05795
scoring_system epss
scoring_elements 0.90506
published_at 2026-04-09T12:55:00Z
7
value 0.05795
scoring_system epss
scoring_elements 0.90513
published_at 2026-04-12T12:55:00Z
8
value 0.05795
scoring_system epss
scoring_elements 0.90507
published_at 2026-04-13T12:55:00Z
9
value 0.05795
scoring_system epss
scoring_elements 0.90525
published_at 2026-04-16T12:55:00Z
10
value 0.05795
scoring_system epss
scoring_elements 0.90524
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0737
11
reference_url https://bugs.launchpad.net/swift/+bug/1466549
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1466549
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298924
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1298924
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0737
14
reference_url https://launchpad.net/swift/+milestone/2.4.0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://launchpad.net/swift/+milestone/2.4.0
15
reference_url https://opendev.org/openstack/swift
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/swift
16
reference_url https://review.openstack.org/#/c/217750
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/217750
17
reference_url https://review.openstack.org/#/c/217750/
reference_id
reference_type
scores
url https://review.openstack.org/#/c/217750/
18
reference_url https://security.openstack.org/ossa/OSSA-2016-004.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.openstack.org/ossa/OSSA-2016-004.html
19
reference_url https://web.archive.org/web/20200228001102/http://www.securityfocus.com/bid/81432
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228001102/http://www.securityfocus.com/bid/81432
20
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
21
reference_url http://www.securityfocus.com/bid/81432
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81432
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
23
reference_url https://access.redhat.com/security/cve/CVE-2016-0737
reference_id CVE-2016-0737
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2016-0737
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0737
reference_id CVE-2016-0737
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-0737
25
reference_url https://github.com/advisories/GHSA-972c-cfv8-2hq8
reference_id GHSA-972c-cfv8-2hq8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-972c-cfv8-2hq8
26
reference_url https://usn.ubuntu.com/3451-1/
reference_id USN-3451-1
reference_type
scores
url https://usn.ubuntu.com/3451-1/
fixed_packages
0
url pkg:deb/debian/swift@2.4.0-1?distro=trixie
purl pkg:deb/debian/swift@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2016-0737, GHSA-972c-cfv8-2hq8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k44-tzfw-pkhw
1
url VCID-4djj-fd3y-jqch
vulnerability_id VCID-4djj-fd3y-jqch
summary The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2014-0232.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2014-0232.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0006.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0006.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0006
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.62067
published_at 2026-04-21T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61907
published_at 2026-04-01T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.6198
published_at 2026-04-02T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.62012
published_at 2026-04-04T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.61981
published_at 2026-04-07T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.62031
published_at 2026-04-08T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.62048
published_at 2026-04-09T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.62069
published_at 2026-04-11T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.62058
published_at 2026-04-12T12:55:00Z
9
value 0.00421
scoring_system epss
scoring_elements 0.62036
published_at 2026-04-13T12:55:00Z
10
value 0.00421
scoring_system epss
scoring_elements 0.62079
published_at 2026-04-16T12:55:00Z
11
value 0.00421
scoring_system epss
scoring_elements 0.62084
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0006
3
reference_url https://bugs.launchpad.net/swift/+bug/1265665
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1265665
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0006
5
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
6
reference_url https://github.com/openstack/swift/commit/754633988931e4095530f6b13389c254096eb485
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/754633988931e4095530f6b13389c254096eb485
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/swift/PYSEC-2014-116.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/swift/PYSEC-2014-116.yaml
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0006
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-0006
9
reference_url http://www.openwall.com/lists/oss-security/2014/01/17/5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/01/17/5
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1051670
reference_id 1051670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1051670
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735582
reference_id 735582
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=735582
12
reference_url https://github.com/advisories/GHSA-cf9m-q836-vf26
reference_id GHSA-cf9m-q836-vf26
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cf9m-q836-vf26
13
reference_url https://access.redhat.com/errata/RHSA-2014:0232
reference_id RHSA-2014:0232
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0232
14
reference_url https://access.redhat.com/errata/RHSA-2014:0367
reference_id RHSA-2014:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0367
15
reference_url https://usn.ubuntu.com/2207-1/
reference_id USN-2207-1
reference_type
scores
url https://usn.ubuntu.com/2207-1/
fixed_packages
0
url pkg:deb/debian/swift@1.11.0-2?distro=trixie
purl pkg:deb/debian/swift@1.11.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.11.0-2%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2014-0006, GHSA-cf9m-q836-vf26, PYSEC-2014-116
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4djj-fd3y-jqch
2
url VCID-4k1g-3b3h-1fbz
vulnerability_id VCID-4k1g-3b3h-1fbz
summary
Temporary urls leaked via logging
In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8761.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8761
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37743
published_at 2026-04-21T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.378
published_at 2026-04-12T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37775
published_at 2026-04-13T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37822
published_at 2026-04-16T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37803
published_at 2026-04-18T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37673
published_at 2026-04-01T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37855
published_at 2026-04-02T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.3788
published_at 2026-04-04T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37758
published_at 2026-04-07T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37809
published_at 2026-04-08T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37821
published_at 2026-04-09T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37836
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8761
2
reference_url https://bugs.launchpad.net/swift/+bug/1685798/comments/18
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1685798/comments/18
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8761
4
reference_url https://launchpad.net/bugs/1685798
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://launchpad.net/bugs/1685798
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8761
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-8761
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1850156
reference_id 1850156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1850156
7
reference_url https://github.com/advisories/GHSA-8fxc-qm65-vpxg
reference_id GHSA-8fxc-qm65-vpxg
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8fxc-qm65-vpxg
fixed_packages
0
url pkg:deb/debian/swift@2.17.0-2?distro=trixie
purl pkg:deb/debian/swift@2.17.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.17.0-2%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2017-8761, GHSA-8fxc-qm65-vpxg
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4k1g-3b3h-1fbz
3
url VCID-4wxz-pgew-5uc4
vulnerability_id VCID-4wxz-pgew-5uc4
summary
OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service
OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-0128.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0128.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0155.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0155.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0329.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0329.html
4
reference_url https://access.redhat.com/errata/RHSA-2016:0126
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0126
5
reference_url https://access.redhat.com/errata/RHSA-2016:0127
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0127
6
reference_url https://access.redhat.com/errata/RHSA-2016:0128
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0128
7
reference_url https://access.redhat.com/errata/RHSA-2016:0155
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0155
8
reference_url https://access.redhat.com/errata/RHSA-2016:0328
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0328
9
reference_url https://access.redhat.com/errata/RHSA-2016:0329
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:0329
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0738.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0738.json
11
reference_url https://access.redhat.com/security/cve/CVE-2016-0738
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2016-0738
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0738
reference_id
reference_type
scores
0
value 0.05795
scoring_system epss
scoring_elements 0.90523
published_at 2026-04-21T12:55:00Z
1
value 0.05795
scoring_system epss
scoring_elements 0.90466
published_at 2026-04-01T12:55:00Z
2
value 0.05795
scoring_system epss
scoring_elements 0.9047
published_at 2026-04-02T12:55:00Z
3
value 0.05795
scoring_system epss
scoring_elements 0.90482
published_at 2026-04-04T12:55:00Z
4
value 0.05795
scoring_system epss
scoring_elements 0.90487
published_at 2026-04-07T12:55:00Z
5
value 0.05795
scoring_system epss
scoring_elements 0.90499
published_at 2026-04-08T12:55:00Z
6
value 0.05795
scoring_system epss
scoring_elements 0.90506
published_at 2026-04-09T12:55:00Z
7
value 0.05795
scoring_system epss
scoring_elements 0.90513
published_at 2026-04-12T12:55:00Z
8
value 0.05795
scoring_system epss
scoring_elements 0.90507
published_at 2026-04-13T12:55:00Z
9
value 0.05795
scoring_system epss
scoring_elements 0.90525
published_at 2026-04-16T12:55:00Z
10
value 0.05795
scoring_system epss
scoring_elements 0.90524
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0738
13
reference_url https://bugs.launchpad.net/cloud-archive/+bug/1493303
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/cloud-archive/+bug/1493303
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298905
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1298905
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0738
16
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
17
reference_url https://github.com/openstack/swift/blob/master/CHANGELOG
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/blob/master/CHANGELOG
18
reference_url https://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/pipermail/package-announce/2016-February/176713.html
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0738
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-0738
20
reference_url https://rhn.redhat.com/errata/RHSA-2016-0128.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-0128.html
21
reference_url https://rhn.redhat.com/errata/RHSA-2016-0155.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-0155.html
22
reference_url https://rhn.redhat.com/errata/RHSA-2016-0329.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rhn.redhat.com/errata/RHSA-2016-0329.html
23
reference_url https://security.openstack.org/ossa/OSSA-2016-004.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.openstack.org/ossa/OSSA-2016-004.html
24
reference_url https://web.archive.org/web/20200228001102/http://www.securityfocus.com/bid/81432
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228001102/http://www.securityfocus.com/bid/81432
25
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
26
reference_url http://www.securityfocus.com/bid/81432
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/81432
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812984
reference_id 812984
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812984
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:2.4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:2.5.0:*:*:*:*:*:*:*
31
reference_url https://github.com/advisories/GHSA-fxwr-2vxm-cg7p
reference_id GHSA-fxwr-2vxm-cg7p
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fxwr-2vxm-cg7p
32
reference_url https://usn.ubuntu.com/3451-1/
reference_id USN-3451-1
reference_type
scores
url https://usn.ubuntu.com/3451-1/
fixed_packages
0
url pkg:deb/debian/swift@2.5.0-3?distro=trixie
purl pkg:deb/debian/swift@2.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.5.0-3%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2016-0738, GHSA-fxwr-2vxm-cg7p
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4wxz-pgew-5uc4
4
url VCID-9sad-598q-vygc
vulnerability_id VCID-9sad-598q-vygc
summary several
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-1197.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-1197.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4155.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4155.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4155
reference_id
reference_type
scores
0
value 0.01015
scoring_system epss
scoring_elements 0.77197
published_at 2026-04-21T12:55:00Z
1
value 0.01015
scoring_system epss
scoring_elements 0.77103
published_at 2026-04-01T12:55:00Z
2
value 0.01015
scoring_system epss
scoring_elements 0.7711
published_at 2026-04-02T12:55:00Z
3
value 0.01015
scoring_system epss
scoring_elements 0.77139
published_at 2026-04-04T12:55:00Z
4
value 0.01015
scoring_system epss
scoring_elements 0.77121
published_at 2026-04-07T12:55:00Z
5
value 0.01015
scoring_system epss
scoring_elements 0.77154
published_at 2026-04-08T12:55:00Z
6
value 0.01015
scoring_system epss
scoring_elements 0.77163
published_at 2026-04-09T12:55:00Z
7
value 0.01015
scoring_system epss
scoring_elements 0.7719
published_at 2026-04-11T12:55:00Z
8
value 0.01015
scoring_system epss
scoring_elements 0.7717
published_at 2026-04-12T12:55:00Z
9
value 0.01015
scoring_system epss
scoring_elements 0.77165
published_at 2026-04-13T12:55:00Z
10
value 0.01015
scoring_system epss
scoring_elements 0.77205
published_at 2026-04-16T12:55:00Z
11
value 0.01015
scoring_system epss
scoring_elements 0.77207
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4155
3
reference_url https://bugs.launchpad.net/swift/+bug/1196932
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1196932
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2161
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4155
6
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
7
reference_url https://github.com/openstack/swift/commit/1f4ec235cdfd8c868f2d6458532f9dc32c00b8ca
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/1f4ec235cdfd8c868f2d6458532f9dc32c00b8ca
8
reference_url https://github.com/openstack/swift/commit/6b9806e0e8cbec60c0a3ece0bd516e0502827515
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/6b9806e0e8cbec60c0a3ece0bd516e0502827515
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-4155
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-4155
10
reference_url https://review.openstack.org/#/c/40643
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/40643
11
reference_url https://review.openstack.org/#/c/40645
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/40645
12
reference_url https://review.openstack.org/#/c/40646
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/40646
13
reference_url http://www.debian.org/security/2012/dsa-2737
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2012/dsa-2737
14
reference_url http://www.openwall.com/lists/oss-security/2013/08/07/6
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/08/07/6
15
reference_url http://www.ubuntu.com/usn/USN-2001-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2001-1
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719008
reference_id 719008
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719008
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=991626
reference_id 991626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=991626
18
reference_url https://github.com/advisories/GHSA-wxx2-gqvv-34hx
reference_id GHSA-wxx2-gqvv-34hx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wxx2-gqvv-34hx
19
reference_url https://access.redhat.com/errata/RHSA-2013:1197
reference_id RHSA-2013:1197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1197
20
reference_url https://usn.ubuntu.com/2001-1/
reference_id USN-2001-1
reference_type
scores
url https://usn.ubuntu.com/2001-1/
fixed_packages
0
url pkg:deb/debian/swift@1.8.0-7?distro=trixie
purl pkg:deb/debian/swift@1.8.0-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.8.0-7%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2013-4155, GHSA-wxx2-gqvv-34hx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sad-598q-vygc
5
url VCID-akvp-y5s1-x7eg
vulnerability_id VCID-akvp-y5s1-x7eg
summary
OpenStack Swift Cross-site Scriping vulnerability
Cross-site scripting (XSS) vulnerability in OpenStack Swift 1.11.0 through 1.13.1 allows remote attackers to inject arbitrary web script or HTML via the WWW-Authenticate header.
references
0
reference_url http://lists.openstack.org/pipermail/openstack-announce/2014-June/000243.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.openstack.org/pipermail/openstack-announce/2014-June/000243.html
1
reference_url https://access.redhat.com/errata/RHSA-2014:0941
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2014:0941
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3497.json
3
reference_url https://access.redhat.com/security/cve/CVE-2014-3497
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2014-3497
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3497
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63431
published_at 2026-04-21T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63323
published_at 2026-04-01T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63384
published_at 2026-04-02T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63411
published_at 2026-04-13T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.63376
published_at 2026-04-07T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63428
published_at 2026-04-08T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.63446
published_at 2026-04-16T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63463
published_at 2026-04-11T12:55:00Z
8
value 0.00445
scoring_system epss
scoring_elements 0.63447
published_at 2026-04-12T12:55:00Z
9
value 0.00445
scoring_system epss
scoring_elements 0.63453
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3497
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1110809
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1110809
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3497
7
reference_url http://secunia.com/advisories/59532
reference_id
reference_type
scores
url http://secunia.com/advisories/59532
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3497
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3497
9
reference_url https://opendev.org/openstack/swift
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/swift
10
reference_url https://review.openstack.org/#/c/101031
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/101031
11
reference_url https://review.openstack.org/#/c/101031/
reference_id
reference_type
scores
url https://review.openstack.org/#/c/101031/
12
reference_url https://review.openstack.org/#/c/101032
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://review.openstack.org/#/c/101032
13
reference_url https://review.openstack.org/#/c/101032/
reference_id
reference_type
scores
url https://review.openstack.org/#/c/101032/
14
reference_url https://web.archive.org/web/20200229060002/http://www.securityfocus.com/bid/68116
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200229060002/http://www.securityfocus.com/bid/68116
15
reference_url http://www.openwall.com/lists/oss-security/2014/06/19/10
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/06/19/10
16
reference_url http://www.securityfocus.com/bid/68116
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68116
17
reference_url http://www.ubuntu.com/usn/USN-2256-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2256-1
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752087
reference_id 752087
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752087
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.11.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:1.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.12.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:1.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:1.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.1:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:1.13.1:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.1:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.1:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:1.13.1:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:1.13.1:rc2:*:*:*:*:*:*
25
reference_url https://github.com/advisories/GHSA-66vj-393f-hxfv
reference_id GHSA-66vj-393f-hxfv
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-66vj-393f-hxfv
26
reference_url https://usn.ubuntu.com/2256-1/
reference_id USN-2256-1
reference_type
scores
url https://usn.ubuntu.com/2256-1/
fixed_packages
0
url pkg:deb/debian/swift@1.13.1-1?distro=trixie
purl pkg:deb/debian/swift@1.13.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.13.1-1%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2014-3497, GHSA-66vj-393f-hxfv
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-akvp-y5s1-x7eg
6
url VCID-cczb-m9jq-wbb2
vulnerability_id VCID-cczb-m9jq-wbb2
summary
OpenStack Swift Unauthorized delete of versioned Swift object
OpenStack Object Storage (Swift) before 2.3.0, when allow_version is configured, allows remote authenticated users to delete the latest version of an object by leveraging listing access to the x-versions-location container.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163113.html
1
reference_url http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.openstack.org/pipermail/openstack-announce/2015-April/000349.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-1681.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1681.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1684.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1684.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2015-1845.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1845.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2015-1846.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1846.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1856.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1856.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-1856
reference_id
reference_type
scores
0
value 0.01033
scoring_system epss
scoring_elements 0.7739
published_at 2026-04-21T12:55:00Z
1
value 0.01033
scoring_system epss
scoring_elements 0.77301
published_at 2026-04-01T12:55:00Z
2
value 0.01033
scoring_system epss
scoring_elements 0.77308
published_at 2026-04-02T12:55:00Z
3
value 0.01033
scoring_system epss
scoring_elements 0.77336
published_at 2026-04-04T12:55:00Z
4
value 0.01033
scoring_system epss
scoring_elements 0.77316
published_at 2026-04-07T12:55:00Z
5
value 0.01033
scoring_system epss
scoring_elements 0.77347
published_at 2026-04-08T12:55:00Z
6
value 0.01033
scoring_system epss
scoring_elements 0.77356
published_at 2026-04-09T12:55:00Z
7
value 0.01033
scoring_system epss
scoring_elements 0.77383
published_at 2026-04-11T12:55:00Z
8
value 0.01033
scoring_system epss
scoring_elements 0.77362
published_at 2026-04-12T12:55:00Z
9
value 0.01033
scoring_system epss
scoring_elements 0.77359
published_at 2026-04-13T12:55:00Z
10
value 0.01033
scoring_system epss
scoring_elements 0.77399
published_at 2026-04-16T12:55:00Z
11
value 0.01033
scoring_system epss
scoring_elements 0.77398
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-1856
9
reference_url https://bugs.launchpad.net/swift/+bug/1430645
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1430645
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1856
11
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
12
reference_url https://git.openstack.org/cgit/openstack/swift/commit/?id=5bb7c286ebb4a54e4d2bd5a02845644d1c651183
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://git.openstack.org/cgit/openstack/swift/commit/?id=5bb7c286ebb4a54e4d2bd5a02845644d1c651183
13
reference_url https://git.openstack.org/cgit/openstack/swift/commit/?id=85afe9316570855c87ea731d0627f6f8f2b73264
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://git.openstack.org/cgit/openstack/swift/commit/?id=85afe9316570855c87ea731d0627f6f8f2b73264
14
reference_url https://git.openstack.org/cgit/openstack/swift/commit/?id=dd9d97458ea007024220a78dba8dd663e8b425d7
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://git.openstack.org/cgit/openstack/swift/commit/?id=dd9d97458ea007024220a78dba8dd663e8b425d7
15
reference_url https://git.openstack.org/cgit/openstack/swift/commit/?id=f6525758ab2456d688430699338993439597a789
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://git.openstack.org/cgit/openstack/swift/commit/?id=f6525758ab2456d688430699338993439597a789
16
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
17
reference_url http://www.securityfocus.com/bid/74182
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/74182
18
reference_url http://www.ubuntu.com/usn/USN-2704-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2704-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1209994
reference_id 1209994
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1209994
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783163
reference_id 783163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=783163
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-1856
reference_id CVE-2015-1856
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-1856
22
reference_url https://github.com/advisories/GHSA-cc77-5vw4-7pwg
reference_id GHSA-cc77-5vw4-7pwg
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cc77-5vw4-7pwg
23
reference_url https://access.redhat.com/errata/RHSA-2015:1681
reference_id RHSA-2015:1681
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1681
24
reference_url https://access.redhat.com/errata/RHSA-2015:1684
reference_id RHSA-2015:1684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1684
25
reference_url https://access.redhat.com/errata/RHSA-2015:1845
reference_id RHSA-2015:1845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1845
26
reference_url https://access.redhat.com/errata/RHSA-2015:1846
reference_id RHSA-2015:1846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1846
27
reference_url https://usn.ubuntu.com/2704-1/
reference_id USN-2704-1
reference_type
scores
url https://usn.ubuntu.com/2704-1/
fixed_packages
0
url pkg:deb/debian/swift@2.2.0-2?distro=trixie
purl pkg:deb/debian/swift@2.2.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.2.0-2%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2015-1856, GHSA-cc77-5vw4-7pwg
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cczb-m9jq-wbb2
7
url VCID-njnr-ngu6-7qdv
vulnerability_id VCID-njnr-ngu6-7qdv
summary
OpenStack Swift Unchecked user input in XML responses
XML injection vulnerability in account/utils.py in OpenStack Swift Folsom, Grizzly, and Havana allows attackers to trigger invalid or spoofed Swift responses via an account name.
references
0
reference_url http://github.com/openstack/swift/commit/4eed6bf5b5028409f730be97ddcfb6bfa893c976
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://github.com/openstack/swift/commit/4eed6bf5b5028409f730be97ddcfb6bfa893c976
1
reference_url http://github.com/openstack/swift/commit/92d7eadd328797d392758c79e258c8455874c80e
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://github.com/openstack/swift/commit/92d7eadd328797d392758c79e258c8455874c80e
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-07/msg00021.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2013-07/msg00021.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-0993.html
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0993.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2161.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2161.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2161
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55942
published_at 2026-04-21T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55926
published_at 2026-04-04T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55955
published_at 2026-04-08T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55957
published_at 2026-04-09T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55966
published_at 2026-04-11T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55946
published_at 2026-04-12T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55928
published_at 2026-04-13T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55965
published_at 2026-04-16T12:55:00Z
8
value 0.00329
scoring_system epss
scoring_elements 0.55968
published_at 2026-04-18T12:55:00Z
9
value 0.00329
scoring_system epss
scoring_elements 0.55791
published_at 2026-04-01T12:55:00Z
10
value 0.00329
scoring_system epss
scoring_elements 0.55904
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2161
6
reference_url https://bugs.launchpad.net/swift/+bug/1183884
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1183884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2161
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4155
9
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
10
reference_url https://github.com/openstack/swift/commit/6659382c4fa348e1ebbce2424968dd7267ea1db1
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/6659382c4fa348e1ebbce2424968dd7267ea1db1
11
reference_url https://github.com/openstack/swift/commit/8f9b135e0a16478a628f20224ce5babe62d4aaba
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/8f9b135e0a16478a628f20224ce5babe62d4aaba
12
reference_url http://www.debian.org/security/2012/dsa-2737
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2012/dsa-2737
13
reference_url http://www.openwall.com/lists/oss-security/2013/06/13/4
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/06/13/4
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712202
reference_id 712202
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712202
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=972988
reference_id 972988
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=972988
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2161
reference_id CVE-2013-2161
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2161
17
reference_url https://github.com/advisories/GHSA-9xgv-6v35-mmcj
reference_id GHSA-9xgv-6v35-mmcj
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9xgv-6v35-mmcj
18
reference_url https://access.redhat.com/errata/RHSA-2013:0993
reference_id RHSA-2013:0993
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0993
19
reference_url https://usn.ubuntu.com/1887-1/
reference_id USN-1887-1
reference_type
scores
url https://usn.ubuntu.com/1887-1/
fixed_packages
0
url pkg:deb/debian/swift@1.8.0-6?distro=trixie
purl pkg:deb/debian/swift@1.8.0-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.8.0-6%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2013-2161, GHSA-9xgv-6v35-mmcj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-njnr-ngu6-7qdv
8
url VCID-qsxb-qjb1-mqfd
vulnerability_id VCID-qsxb-qjb1-mqfd
summary
OpenStack Swift XML external entities (XXE) Injection
An issue was discovered in OpenStack Swift before 2.28.1, 2.29.x before 2.29.2, and 2.30.0. By supplying crafted XML files, an authenticated user may coerce the S3 API into returning arbitrary file contents from the host server, resulting in unauthorized read access to potentially sensitive data. This impacts both s3api deployments (Rocky or later), and swift3 deployments (Queens and earlier, no longer actively developed).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47950.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-47950
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46286
published_at 2026-04-21T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46342
published_at 2026-04-18T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46346
published_at 2026-04-16T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46289
published_at 2026-04-13T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.4628
published_at 2026-04-12T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46308
published_at 2026-04-11T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46283
published_at 2026-04-08T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46227
published_at 2026-04-07T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46281
published_at 2026-04-04T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46261
published_at 2026-04-02T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.46284
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-47950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47950
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
5
reference_url https://github.com/openstack/swift/commit/12e54391861e7d182d58f89fb88b027e65842640
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/12e54391861e7d182d58f89fb88b027e65842640
6
reference_url https://github.com/openstack/swift/commit/7d13d1a82e1f5d01205a13184907501b4fcbe2b0
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/7d13d1a82e1f5d01205a13184907501b4fcbe2b0
7
reference_url https://github.com/openstack/swift/commit/8dd96470a859dc7b189404fb67bd3899ae9c617f
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/8dd96470a859dc7b189404fb67bd3899ae9c617f
8
reference_url https://github.com/openstack/swift/commit/b8467e190f6fc67fd8fb6a8c5e32b2aa6a10fd8e
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/b8467e190f6fc67fd8fb6a8c5e32b2aa6a10fd8e
9
reference_url https://github.com/openstack/swift/commit/baa98848451b5c234443a068691e12841a5a8383
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/baa98848451b5c234443a068691e12841a5a8383
10
reference_url https://github.com/openstack/swift/commit/c834e7a53d5a33a3fd13ffd954e6f4f4ee953dfc
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/c834e7a53d5a33a3fd13ffd954e6f4f4ee953dfc
11
reference_url https://github.com/openstack/swift/commit/d8d04ef43c90079d436b2e49617b4425ba39c28e
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/d8d04ef43c90079d436b2e49617b4425ba39c28e
12
reference_url https://github.com/openstack/swift/commit/f10672514217adadfc776d9ea2ffb20a37ce073b
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/f10672514217adadfc776d9ea2ffb20a37ce073b
13
reference_url https://launchpad.net/bugs/1998625
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T15:46:54Z/
url https://launchpad.net/bugs/1998625
14
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T15:46:54Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00021.html
15
reference_url https://security.openstack.org/ossa/OSSA-2023-001.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T15:46:54Z/
url https://security.openstack.org/ossa/OSSA-2023-001.html
16
reference_url https://www.debian.org/security/2023/dsa-5327
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-04T15:46:54Z/
url https://www.debian.org/security/2023/dsa-5327
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029154
reference_id 1029154
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029154
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160618
reference_id 2160618
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160618
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-47950
reference_id CVE-2022-47950
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-47950
20
reference_url https://github.com/advisories/GHSA-274c-rx2j-2v3x
reference_id GHSA-274c-rx2j-2v3x
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-274c-rx2j-2v3x
21
reference_url https://access.redhat.com/errata/RHSA-2023:1013
reference_id RHSA-2023:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1013
22
reference_url https://access.redhat.com/errata/RHSA-2023:1277
reference_id RHSA-2023:1277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1277
23
reference_url https://usn.ubuntu.com/5852-1/
reference_id USN-5852-1
reference_type
scores
url https://usn.ubuntu.com/5852-1/
fixed_packages
0
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.30.0-4?distro=trixie
purl pkg:deb/debian/swift@2.30.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.0-4%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2022-47950, GHSA-274c-rx2j-2v3x
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qsxb-qjb1-mqfd
9
url VCID-uexc-7rt7-hbgx
vulnerability_id VCID-uexc-7rt7-hbgx
summary
OpenStack Keystone and other components vulnerable to Improper Certificate Validation
HTTPSConnections in OpenStack Keystone 2013, OpenStack Compute 2013.1, and possibly other OpenStack components, fail to validate server-side SSL certificates.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2255.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2255.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2255
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61656
published_at 2026-04-16T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61614
published_at 2026-04-13T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61634
published_at 2026-04-12T12:55:00Z
3
value 0.00414
scoring_system epss
scoring_elements 0.61645
published_at 2026-04-21T12:55:00Z
4
value 0.00414
scoring_system epss
scoring_elements 0.61624
published_at 2026-04-09T12:55:00Z
5
value 0.00414
scoring_system epss
scoring_elements 0.61609
published_at 2026-04-08T12:55:00Z
6
value 0.00414
scoring_system epss
scoring_elements 0.61561
published_at 2026-04-07T12:55:00Z
7
value 0.00414
scoring_system epss
scoring_elements 0.6159
published_at 2026-04-04T12:55:00Z
8
value 0.00414
scoring_system epss
scoring_elements 0.61562
published_at 2026-04-02T12:55:00Z
9
value 0.00414
scoring_system epss
scoring_elements 0.61661
published_at 2026-04-18T12:55:00Z
10
value 0.00414
scoring_system epss
scoring_elements 0.61487
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2255
2
reference_url https://bugs.launchpad.net/ossn/+bug/1188189
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/ossn/+bug/1188189
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2255
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2255
4
reference_url https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2255
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2255
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2255
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/85562
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/85562
7
reference_url https://github.com/openstack/cinder/commit/0f9652d92e175a1f7dc3c2a37ab444b8f189375a
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/cinder/commit/0f9652d92e175a1f7dc3c2a37ab444b8f189375a
8
reference_url https://github.com/openstack/keystone/commit/5bd4c2984d329625a2a8442b316fa235dbb88a3d
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/keystone/commit/5bd4c2984d329625a2a8442b316fa235dbb88a3d
9
reference_url https://github.com/openstack/neutron/commit/7255e056092f034daaeb4246a812900645d46911
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/neutron/commit/7255e056092f034daaeb4246a812900645d46911
10
reference_url https://github.com/openstack/python-keystoneclient/commit/20e166fd8a943ee3f91ba362a47e9c14c7cc5f4c
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/python-keystoneclient/commit/20e166fd8a943ee3f91ba362a47e9c14c7cc5f4c
11
reference_url https://web.archive.org/web/20200229073508/https://www.securityfocus.com/bid/61118
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200229073508/https://www.securityfocus.com/bid/61118
12
reference_url https://www.securityfocus.com/bid/61118
reference_id
reference_type
scores
url https://www.securityfocus.com/bid/61118
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=924514
reference_id 924514
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=924514
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:compute:2013.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:compute:2013.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:compute:2013.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2013:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:keystone:2013:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:keystone:2013:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:4.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
21
reference_url https://access.redhat.com/security/cve/cve-2013-2255
reference_id CVE-2013-2255
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/cve-2013-2255
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2255
reference_id CVE-2013-2255
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2255
23
reference_url https://security-tracker.debian.org/tracker/CVE-2013-2255
reference_id CVE-2013-2255
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security-tracker.debian.org/tracker/CVE-2013-2255
24
reference_url https://github.com/advisories/GHSA-qh2x-hpf9-cf2g
reference_id GHSA-qh2x-hpf9-cf2g
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qh2x-hpf9-cf2g
fixed_packages
0
url pkg:deb/debian/swift@0?distro=trixie
purl pkg:deb/debian/swift@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@0%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2013-2255, GHSA-qh2x-hpf9-cf2g
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uexc-7rt7-hbgx
10
url VCID-wf91-36ce-hbcz
vulnerability_id VCID-wf91-36ce-hbcz
summary
OpenStack Object Storage (swift) Code Injection vulnerability
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1379.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2012-1379.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
3
reference_url https://access.redhat.com/errata/RHSA-2012:1379
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2012:1379
4
reference_url https://access.redhat.com/errata/RHSA-2013:0691
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2013:0691
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
6
reference_url https://access.redhat.com/security/cve/CVE-2012-4406
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-4406
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
reference_id
reference_type
scores
0
value 0.0471
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-18T12:55:00Z
1
value 0.0471
scoring_system epss
scoring_elements 0.89382
published_at 2026-04-21T12:55:00Z
2
value 0.0471
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-13T12:55:00Z
3
value 0.0471
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-12T12:55:00Z
4
value 0.0471
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-11T12:55:00Z
5
value 0.0471
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-09T12:55:00Z
6
value 0.0471
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-08T12:55:00Z
7
value 0.0471
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-07T12:55:00Z
8
value 0.0471
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-04T12:55:00Z
9
value 0.0471
scoring_system epss
scoring_elements 0.89333
published_at 2026-04-02T12:55:00Z
10
value 0.0471
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
8
reference_url https://bugs.launchpad.net/swift/+bug/1006414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1006414
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=854757
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=854757
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
12
reference_url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
13
reference_url https://launchpad.net/swift/+milestone/1.7.0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://launchpad.net/swift/+milestone/1.7.0
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
15
reference_url https://opendev.org/openstack/swift
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/swift
16
reference_url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/16
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/16
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/4
19
reference_url http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/55420
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
reference_id 686812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
29
reference_url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
reference_id GHSA-v7mh-3jgf-r26c
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
30
reference_url https://usn.ubuntu.com/1887-1/
reference_id USN-1887-1
reference_type
scores
url https://usn.ubuntu.com/1887-1/
fixed_packages
0
url pkg:deb/debian/swift@1.4.8-2?distro=trixie
purl pkg:deb/debian/swift@1.4.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.4.8-2%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2012-4406, GHSA-v7mh-3jgf-r26c
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wf91-36ce-hbcz
11
url VCID-y2t3-3pyp-tbd2
vulnerability_id VCID-y2t3-3pyp-tbd2
summary
OpenStack Swift metadata constraints are not correctly enforced
OpenStack Object Storage (Swift) before 2.2.0 allows remote authenticated users to bypass the max_meta_count and other metadata constraints via multiple crafted requests which exceed the limit when combined.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-0835.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-0835.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-0836.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-0836.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-1495.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1495.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7960.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7960.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7960
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53032
published_at 2026-04-13T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.52978
published_at 2026-04-02T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.53059
published_at 2026-04-21T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.53077
published_at 2026-04-18T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53069
published_at 2026-04-16T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.53021
published_at 2026-04-08T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.5297
published_at 2026-04-07T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.52954
published_at 2026-04-01T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.53003
published_at 2026-04-04T12:55:00Z
9
value 0.00297
scoring_system epss
scoring_elements 0.53049
published_at 2026-04-12T12:55:00Z
10
value 0.00297
scoring_system epss
scoring_elements 0.53064
published_at 2026-04-11T12:55:00Z
11
value 0.00297
scoring_system epss
scoring_elements 0.53015
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7960
6
reference_url https://bugs.launchpad.net/swift/+bug/1365350
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1365350
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7960
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/96901
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/96901
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
11
reference_url https://github.com/openstack/swift/commit/06800cbe446ce4c937a57b69517b55c3bba9b6e1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/06800cbe446ce4c937a57b69517b55c3bba9b6e1
12
reference_url https://github.com/openstack/swift/commit/2c4622a28ea04e1c6b2382189b0a1f6cccdc9c0f
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/2c4622a28ea04e1c6b2382189b0a1f6cccdc9c0f
13
reference_url https://github.com/openstack/swift/commit/5b2c27a5874c2b5b0a333e4955b03544f6a8119f
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/5b2c27a5874c2b5b0a333e4955b03544f6a8119f
14
reference_url http://www.openwall.com/lists/oss-security/2014/10/07/39
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/10/07/39
15
reference_url http://www.openwall.com/lists/oss-security/2014/10/08/7
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/10/08/7
16
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
17
reference_url http://www.securityfocus.com/bid/70279
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/70279
18
reference_url http://www.ubuntu.com/usn/USN-2704-1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2704-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1150461
reference_id 1150461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1150461
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7960
reference_id CVE-2014-7960
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:P/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-7960
22
reference_url https://github.com/advisories/GHSA-g6x3-55qv-x6p2
reference_id GHSA-g6x3-55qv-x6p2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g6x3-55qv-x6p2
23
reference_url https://access.redhat.com/errata/RHSA-2015:0835
reference_id RHSA-2015:0835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0835
24
reference_url https://access.redhat.com/errata/RHSA-2015:0836
reference_id RHSA-2015:0836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0836
25
reference_url https://access.redhat.com/errata/RHSA-2015:1495
reference_id RHSA-2015:1495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1495
26
reference_url https://usn.ubuntu.com/2704-1/
reference_id USN-2704-1
reference_type
scores
url https://usn.ubuntu.com/2704-1/
fixed_packages
0
url pkg:deb/debian/swift@2.2.0-1?distro=trixie
purl pkg:deb/debian/swift@2.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.2.0-1%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2014-7960, GHSA-g6x3-55qv-x6p2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2t3-3pyp-tbd2
12
url VCID-yhkc-dkqq-x7fg
vulnerability_id VCID-yhkc-dkqq-x7fg
summary
Exposure of Sensitive Information to an Unauthorized Actor
OpenStack Object Storage (Swift) before 2.4.0 allows attackers to obtain sensitive information via a PUT tempurl and a DLO object manifest that references an object in another container.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00025.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-1895.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2015-1895.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0329.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2016-0329.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5223.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5223.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5223
reference_id
reference_type
scores
0
value 0.01146
scoring_system epss
scoring_elements 0.78457
published_at 2026-04-13T12:55:00Z
1
value 0.01146
scoring_system epss
scoring_elements 0.78427
published_at 2026-04-07T12:55:00Z
2
value 0.01146
scoring_system epss
scoring_elements 0.7848
published_at 2026-04-21T12:55:00Z
3
value 0.01146
scoring_system epss
scoring_elements 0.78485
published_at 2026-04-16T12:55:00Z
4
value 0.01146
scoring_system epss
scoring_elements 0.78413
published_at 2026-04-02T12:55:00Z
5
value 0.01146
scoring_system epss
scoring_elements 0.78444
published_at 2026-04-04T12:55:00Z
6
value 0.01146
scoring_system epss
scoring_elements 0.78454
published_at 2026-04-08T12:55:00Z
7
value 0.01146
scoring_system epss
scoring_elements 0.78465
published_at 2026-04-12T12:55:00Z
8
value 0.01146
scoring_system epss
scoring_elements 0.78484
published_at 2026-04-18T12:55:00Z
9
value 0.01146
scoring_system epss
scoring_elements 0.78407
published_at 2026-04-01T12:55:00Z
10
value 0.01146
scoring_system epss
scoring_elements 0.78458
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5223
5
reference_url https://bugs.launchpad.net/swift/+bug/1449212
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1449212
6
reference_url https://bugs.launchpad.net/swift/+bug/1453948
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1453948
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5223
8
reference_url https://github.com/openstack/swift
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift
9
reference_url https://security.openstack.org/ossa/OSSA-2015-016.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.openstack.org/ossa/OSSA-2015-016.html
10
reference_url https://web.archive.org/web/20200804233308/http://www.securityfocus.com/bid/84827
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200804233308/http://www.securityfocus.com/bid/84827
11
reference_url http://www.openwall.com/lists/oss-security/2015/08/26/5
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2015/08/26/5
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
13
reference_url http://www.securityfocus.com/bid/84827
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/84827
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1255622
reference_id 1255622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1255622
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797032
reference_id 797032
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797032
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5223
reference_id CVE-2015-5223
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-5223
18
reference_url https://github.com/advisories/GHSA-q45h-chc8-hvp6
reference_id GHSA-q45h-chc8-hvp6
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q45h-chc8-hvp6
19
reference_url https://access.redhat.com/errata/RHSA-2015:1895
reference_id RHSA-2015:1895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1895
20
reference_url https://usn.ubuntu.com/3451-1/
reference_id USN-3451-1
reference_type
scores
url https://usn.ubuntu.com/3451-1/
fixed_packages
0
url pkg:deb/debian/swift@2.4.0-1?distro=trixie
purl pkg:deb/debian/swift@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
aliases CVE-2015-5223, GHSA-q45h-chc8-hvp6
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yhkc-dkqq-x7fg
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie