{"url":"http://public2.vulnerablecode.io/api/packages/975207?format=json","purl":"pkg:apk/alpine/py3-werkzeug@2.3.7-r0?arch=x86&distroversion=v3.23&reponame=main","type":"apk","namespace":"alpine","name":"py3-werkzeug","version":"2.3.7-r0","qualifiers":{"arch":"x86","distroversion":"v3.23","reponame":"main"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.0.6-r0","latest_non_vulnerable_version":"3.0.6-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11353?format=json","vulnerability_id":"VCID-bxfr-hpkh-cyby","summary":"Werkzeug is a comprehensive WSGI web application library. If an upload of a file that starts with CR or LF and then is followed by megabytes of data without these characters: all of these bytes are appended chunk by chunk into internal bytearray and lookup for boundary is performed on growing buffer. This allows an attacker to cause a denial of service by sending crafted multipart data to an endpoint that will parse it. The amount of CPU time required can block worker processes from handling legitimate requests. This vulnerability has been patched in version 3.0.1.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46136.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46136","reference_id":"","reference_type":"","scores":[{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68716","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68766","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00573","scoring_system":"epss","scoring_elements":"0.68772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70059","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70139","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70096","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70109","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00622","scoring_system":"epss","scoring_elements":"0.70036","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46136"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/pallets/werkzeug","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pallets/werkzeug"},{"reference_url":"https://github.com/pallets/werkzeug/commit/b1916c0c083e0be1c9d887ee2f3d696922bfc5c1","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pallets/werkzeug/commit/b1916c0c083e0be1c9d887ee2f3d696922bfc5c1"},{"reference_url":"https://github.com/pallets/werkzeug/commit/f2300208d5e2a5076cbbb4c2aad71096fd040ef9","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pallets/werkzeug/commit/f2300208d5e2a5076cbbb4c2aad71096fd040ef9"},{"reference_url":"https://github.com/pallets/werkzeug/commit/f3c803b3ade485a45f12b6d6617595350c0f03e2","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pallets/werkzeug/commit/f3c803b3ade485a45f12b6d6617595350c0f03e2"},{"reference_url":"https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pallets/werkzeug/security/advisories/GHSA-hrfv-mqp8-q5rw"},{"reference_url":"https://github.com/pypa/advisory-database/tree/main/vulns/werkzeug/PYSEC-2023-221.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/pypa/advisory-database/tree/main/vulns/werkzeug/PYSEC-2023-221.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231124-0008","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.netapp.com/advisory/ntap-20231124-0008"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054553","reference_id":"1054553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054553"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246310","reference_id":"2246310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2246310"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46136","reference_id":"CVE-2023-46136","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46136"},{"reference_url":"https://github.com/advisories/GHSA-hrfv-mqp8-q5rw","reference_id":"GHSA-hrfv-mqp8-q5rw","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-hrfv-mqp8-q5rw"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7473","reference_id":"RHSA-2023:7473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7477","reference_id":"RHSA-2023:7477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7610","reference_id":"RHSA-2023:7610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0189","reference_id":"RHSA-2024:0189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0214","reference_id":"RHSA-2024:0214","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0214"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9775","reference_id":"RHSA-2025:9775","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9775"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/975207?format=json","purl":"pkg:apk/alpine/py3-werkzeug@2.3.7-r0?arch=x86&distroversion=v3.23&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/py3-werkzeug@2.3.7-r0%3Farch=x86&distroversion=v3.23&reponame=main"}],"aliases":["CVE-2023-46136","GHSA-hrfv-mqp8-q5rw","PYSEC-2023-221"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bxfr-hpkh-cyby"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/py3-werkzeug@2.3.7-r0%3Farch=x86&distroversion=v3.23&reponame=main"}