Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-wf91-36ce-hbcz
Summary
OpenStack Object Storage (swift) Code Injection vulnerability
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Aliases
0
alias CVE-2012-4406
1
alias GHSA-v7mh-3jgf-r26c
Fixed_packages
0
url pkg:deb/debian/swift@1.4.8-2?distro=trixie
purl pkg:deb/debian/swift@1.4.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@1.4.8-2%3Fdistro=trixie
1
url pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/swift@2.26.0-10%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.26.0-10%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/swift@2.30.1-0%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.30.1-0%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/swift@2.35.1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.35.1-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/swift@2.37.1-3?distro=trixie
purl pkg:deb/debian/swift@2.37.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/swift@2.37.1-3%3Fdistro=trixie
5
url pkg:pypi/swift@2.15.2
purl pkg:pypi/swift@2.15.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsxb-qjb1-mqfd
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/swift@2.15.2
Affected_packages
0
url pkg:pypi/swift@1.0.2
purl pkg:pypi/swift@1.0.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k44-tzfw-pkhw
1
vulnerability VCID-4k1g-3b3h-1fbz
2
vulnerability VCID-4wxz-pgew-5uc4
3
vulnerability VCID-9sad-598q-vygc
4
vulnerability VCID-cczb-m9jq-wbb2
5
vulnerability VCID-njnr-ngu6-7qdv
6
vulnerability VCID-qsxb-qjb1-mqfd
7
vulnerability VCID-wf91-36ce-hbcz
8
vulnerability VCID-y2t3-3pyp-tbd2
9
vulnerability VCID-yhkc-dkqq-x7fg
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/swift@1.0.2
1
url pkg:rpm/redhat/appliance@1.7.1-1?arch=el6rhs
purl pkg:rpm/redhat/appliance@1.7.1-1?arch=el6rhs
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/appliance@1.7.1-1%3Farch=el6rhs
2
url pkg:rpm/redhat/augeas@0.9.0-1?arch=el6
purl pkg:rpm/redhat/augeas@0.9.0-1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/augeas@0.9.0-1%3Farch=el6
3
url pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1?arch=el6rhs
purl pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1?arch=el6rhs
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1%3Farch=el6rhs
4
url pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1?arch=el6
purl pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1%3Farch=el6
5
url pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1?arch=el5
purl pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glusterfs@3.3.0.7rhs-1%3Farch=el5
6
url pkg:rpm/redhat/gluster-swift@1.4.8-5?arch=el6rhs
purl pkg:rpm/redhat/gluster-swift@1.4.8-5?arch=el6rhs
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gluster-swift@1.4.8-5%3Farch=el6rhs
7
url pkg:rpm/redhat/libvirt@0.9.10-21.el6_3?arch=8
purl pkg:rpm/redhat/libvirt@0.9.10-21.el6_3?arch=8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-gmyn-vg39-q3bv
2
vulnerability VCID-n6wn-8uvv-xqb4
3
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libvirt@0.9.10-21.el6_3%3Farch=8
8
url pkg:rpm/redhat/openstack-swift@1.4.8-5?arch=el6
purl pkg:rpm/redhat/openstack-swift@1.4.8-5?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openstack-swift@1.4.8-5%3Farch=el6
9
url pkg:rpm/redhat/rhn-client-tools@1.0.0-73?arch=el6rhs
purl pkg:rpm/redhat/rhn-client-tools@1.0.0-73?arch=el6rhs
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhn-client-tools@1.0.0-73%3Farch=el6rhs
10
url pkg:rpm/redhat/sanlock@2.3-4?arch=el6_3
purl pkg:rpm/redhat/sanlock@2.3-4?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sanlock@2.3-4%3Farch=el6_3
11
url pkg:rpm/redhat/sos@2.2-17.2?arch=el6rhs
purl pkg:rpm/redhat/sos@2.2-17.2?arch=el6rhs
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sos@2.2-17.2%3Farch=el6rhs
12
url pkg:rpm/redhat/vdsm@4.9.6-20?arch=el6rhs
purl pkg:rpm/redhat/vdsm@4.9.6-20?arch=el6rhs
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dyw1-b4w5-3bhe
1
vulnerability VCID-n6wn-8uvv-xqb4
2
vulnerability VCID-wf91-36ce-hbcz
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/vdsm@4.9.6-20%3Farch=el6rhs
References
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089472.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1379.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2012-1379.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0691.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://rhn.redhat.com/errata/RHSA-2013-0691.html
3
reference_url https://access.redhat.com/errata/RHSA-2012:1379
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2012:1379
4
reference_url https://access.redhat.com/errata/RHSA-2013:0691
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2013:0691
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4406.json
6
reference_url https://access.redhat.com/security/cve/CVE-2012-4406
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/CVE-2012-4406
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
reference_id
reference_type
scores
0
value 0.0471
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-18T12:55:00Z
1
value 0.0471
scoring_system epss
scoring_elements 0.89382
published_at 2026-04-21T12:55:00Z
2
value 0.0471
scoring_system epss
scoring_elements 0.8937
published_at 2026-04-13T12:55:00Z
3
value 0.0471
scoring_system epss
scoring_elements 0.89373
published_at 2026-04-12T12:55:00Z
4
value 0.0471
scoring_system epss
scoring_elements 0.89376
published_at 2026-04-11T12:55:00Z
5
value 0.0471
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-09T12:55:00Z
6
value 0.0471
scoring_system epss
scoring_elements 0.89364
published_at 2026-04-08T12:55:00Z
7
value 0.0471
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-07T12:55:00Z
8
value 0.0471
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-04T12:55:00Z
9
value 0.0471
scoring_system epss
scoring_elements 0.89333
published_at 2026-04-02T12:55:00Z
10
value 0.0471
scoring_system epss
scoring_elements 0.89328
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4406
8
reference_url https://bugs.launchpad.net/swift/+bug/1006414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/swift/+bug/1006414
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=854757
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=854757
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4406
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79140
12
reference_url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a
13
reference_url https://launchpad.net/swift/+milestone/1.7.0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://launchpad.net/swift/+milestone/1.7.0
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-4406
15
reference_url https://opendev.org/openstack/swift
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://opendev.org/openstack/swift
16
reference_url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20130629092623/http://www.securityfocus.com/bid/55420
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/16
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/16
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/09/05/4
19
reference_url http://www.securityfocus.com/bid/55420
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/55420
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
reference_id 686812
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686812
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openstack:swift:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_management_console:2.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
29
reference_url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
reference_id GHSA-v7mh-3jgf-r26c
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v7mh-3jgf-r26c
30
reference_url https://usn.ubuntu.com/1887-1/
reference_id USN-1887-1
reference_type
scores
url https://usn.ubuntu.com/1887-1/
Weaknesses
0
cwe_id 502
name Deserialization of Untrusted Data
description The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
1
cwe_id 94
name Improper Control of Generation of Code ('Code Injection')
description The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 78
name Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
description The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
4
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score7.5 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-wf91-36ce-hbcz