Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4062-1 | python-werkzeug security update |
![]() |
EUVD-2024-1358 | Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. |
![]() |
GHSA-2g68-c3qc-8985 | Werkzeug debugger vulnerable to remote execution when interacting with attacker controlled domain |
![]() |
USN-6799-1 | Werkzeug vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Mon, 23 Jun 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:ceph_storage:7.1::el9 |
Thu, 08 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat ceph Storage
|
|
CPEs | cpe:/a:redhat:ceph_storage:7.1::el8 | |
Vendors & Products |
Redhat ceph Storage
|
Fri, 21 Feb 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Palletsprojects
Palletsprojects werkzeug |
|
CPEs | cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:* | |
Vendors & Products |
Palletsprojects
Palletsprojects werkzeug |
|
Metrics |
ssvc
|
Tue, 03 Dec 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openstack:16.2::el8 |
Mon, 25 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.15::el8 |
Fri, 22 Nov 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openstack
|
|
CPEs | cpe:/a:redhat:openstack:17.1::el8 cpe:/a:redhat:openstack:17.1::el9 |
|
Vendors & Products |
Redhat openstack
|
Wed, 06 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift:4.14::el8 |
Fri, 06 Sep 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openshift_ironic:4.15::el9 |
Thu, 29 Aug 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat openshift Ironic
|
|
CPEs | cpe:/a:redhat:openshift_ironic:4.12::el9 | |
Vendors & Products |
Redhat openshift Ironic
|
Tue, 13 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat openshift |
|
CPEs | cpe:/a:redhat:openshift:4.16::el9 | |
Vendors & Products |
Redhat
Redhat openshift |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-21T18:03:28.226Z
Reserved: 2024-04-30T06:56:33.381Z
Link: CVE-2024-34069

Updated: 2025-02-21T18:03:28.226Z

Status : Awaiting Analysis
Published: 2024-05-06T15:15:23.990
Modified: 2025-02-21T18:15:16.663
Link: CVE-2024-34069


No data.