Lookup for vulnerable packages by Package URL.

GET /api/packages/100128?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/100128?format=api",
    "purl": "pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5?arch=el7",
    "type": "rpm",
    "namespace": "redhat",
    "name": "rh-nodejs12-nodejs-nodemon",
    "version": "2.0.3-5",
    "qualifiers": {
        "arch": "el7"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11629?format=api",
            "vulnerability_id": "VCID-1xdz-dku3-qqc4",
            "summary": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nA flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17144",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17137",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17229",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17287",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17265",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17216",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17157",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17097",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17102",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1731",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17138",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3672"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:33Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988342"
                },
                {
                    "reference_url": "https://c-ares.haxx.se/adv_20210810.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:33Z/"
                        }
                    ],
                    "url": "https://c-ares.haxx.se/adv_20210810.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992053",
                    "reference_id": "992053",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992053"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202108-13",
                    "reference_id": "ASA-202108-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202108-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2268",
                    "reference_id": "AVG-2268",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2268"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672",
                    "reference_id": "CVE-2021-3672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3672"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-02",
                    "reference_id": "GLSA-202401-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202401-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-29",
                    "reference_id": "GLSA-202405-29",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2043",
                    "reference_id": "RHSA-2022:2043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2043"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5034-1/",
                    "reference_id": "USN-5034-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5034-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5034-2/",
                    "reference_id": "USN-5034-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5034-2/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-3672"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdz-dku3-qqc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45135?format=api",
            "vulnerability_id": "VCID-4f1w-xpyy-2fcf",
            "summary": "glob-parent vulnerable to Regular Expression Denial of Service in enclosure regex\nThis affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28469.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28469.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75465",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75434",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00888",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75431",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00913",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75887",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00913",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00913",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75851",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00913",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75863",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76932",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76924",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76886",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76928",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469"
                },
                {
                    "reference_url": "https://github.com/gulpjs/glob-parent",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/gulpjs/glob-parent"
                },
                {
                    "reference_url": "https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9"
                },
                {
                    "reference_url": "https://github.com/gulpjs/glob-parent/commit/4a80667c69355c76a572a5892b0f133c8e1f457e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/gulpjs/glob-parent/commit/4a80667c69355c76a572a5892b0f133c8e1f457e"
                },
                {
                    "reference_url": "https://github.com/gulpjs/glob-parent/pull/36",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/gulpjs/glob-parent/pull/36"
                },
                {
                    "reference_url": "https://github.com/gulpjs/glob-parent/pull/36/commits/c6db86422a9731d4f3d332ce4a81c27ea6b0ee46",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/gulpjs/glob-parent/pull/36/commits/c6db86422a9731d4f3d332ce4a81c27ea6b0ee46"
                },
                {
                    "reference_url": "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28469"
                },
                {
                    "reference_url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093"
                },
                {
                    "reference_url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092"
                },
                {
                    "reference_url": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459",
                    "reference_id": "1945459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945459"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-ww39-953v-wcq6",
                    "reference_id": "GHSA-ww39-953v-wcq6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-ww39-953v-wcq6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438",
                    "reference_id": "RHSA-2021:2438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2438"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2865",
                    "reference_id": "RHSA-2021:2865",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2865"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4626",
                    "reference_id": "RHSA-2021:4626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4626"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5171",
                    "reference_id": "RHSA-2021:5171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0246",
                    "reference_id": "RHSA-2022:0246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0350",
                    "reference_id": "RHSA-2022:0350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6595",
                    "reference_id": "RHSA-2022:6595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6595"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2020-28469",
                "GHSA-ww39-953v-wcq6"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4f1w-xpyy-2fcf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34821?format=api",
            "vulnerability_id": "VCID-53xm-8w84-93cx",
            "summary": "Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22930.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22930.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55216",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55383",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55342",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55378",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55315",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55339",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55321",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55371",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55382",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55361",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22930"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394",
                    "reference_id": "1988394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202108-1",
                    "reference_id": "ASA-202108-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202108-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2239",
                    "reference_id": "AVG-2239",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2239"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-02",
                    "reference_id": "GLSA-202401-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-29",
                    "reference_id": "GLSA-202405-29",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-22930"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53xm-8w84-93cx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34825?format=api",
            "vulnerability_id": "VCID-7cth-47w2-17hy",
            "summary": "Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22940.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22940.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59679",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59824",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59834",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59841",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59753",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59777",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59747",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59812",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59831",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59815",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59797",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22940"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029",
                    "reference_id": "1993029",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993029"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2283",
                    "reference_id": "AVG-2283",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2283"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-02",
                    "reference_id": "GLSA-202401-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-29",
                    "reference_id": "GLSA-202405-29",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-22940"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7cth-47w2-17hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33208?format=api",
            "vulnerability_id": "VCID-7tyw-ppyt-zqgr",
            "summary": "ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse\n### Overview\nThe `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability.\n\nIf an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context.\n\n### Patches\n\nThis has been patched in 1.3.6.\n\n### Steps to reproduce\n\npayload.ini\n```\n[__proto__]\npolluted = \"polluted\"\n```\n\npoc.js:\n```\nvar fs = require('fs')\nvar ini = require('ini')\n\nvar parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8'))\nconsole.log(parsed)\nconsole.log(parsed.__proto__)\nconsole.log(polluted)\n```\n\n```\n> node poc.js\n{}\n{ polluted: 'polluted' }\n{ polluted: 'polluted' }\npolluted\n```",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7788.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7788.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5253",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52444",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52471",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52489",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52484",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52518",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52502",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00291",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52546",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788"
                },
                {
                    "reference_url": "https://github.com/npm/ini",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/npm/ini"
                },
                {
                    "reference_url": "https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7788"
                },
                {
                    "reference_url": "https://snyk.io/vuln/SNYK-JS-INI-1048974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://snyk.io/vuln/SNYK-JS-INI-1048974"
                },
                {
                    "reference_url": "https://www.npmjs.com/advisories/1589",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/advisories/1589"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444",
                    "reference_id": "1907444",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1907444"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977718",
                    "reference_id": "977718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977718"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-qqgx-2p2h-9c37",
                    "reference_id": "GHSA-qqgx-2p2h-9c37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-qqgx-2p2h-9c37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0421",
                    "reference_id": "RHSA-2021:0421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0421"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0485",
                    "reference_id": "RHSA-2021:0485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0521",
                    "reference_id": "RHSA-2021:0521",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0521"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0548",
                    "reference_id": "RHSA-2021:0548",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0548"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0549",
                    "reference_id": "RHSA-2021:0549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0549"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0551",
                    "reference_id": "RHSA-2021:0551",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0551"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5171",
                    "reference_id": "RHSA-2021:5171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0246",
                    "reference_id": "RHSA-2022:0246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0350",
                    "reference_id": "RHSA-2022:0350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6595",
                    "reference_id": "RHSA-2022:6595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6595"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2020-7788",
                "GHSA-qqgx-2p2h-9c37"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7tyw-ppyt-zqgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34824?format=api",
            "vulnerability_id": "VCID-9g7s-y7nq-xfbb",
            "summary": "Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22939.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22939.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31597",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3165",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31629",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31744",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31788",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31607",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3166",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31689",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31693",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31653",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31617",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22939"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039",
                    "reference_id": "1993039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2283",
                    "reference_id": "AVG-2283",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2283"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-02",
                    "reference_id": "GLSA-202401-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202401-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-29",
                    "reference_id": "GLSA-202405-29",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-22939"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9g7s-y7nq-xfbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10994?format=api",
            "vulnerability_id": "VCID-a9w9-1d4p-vqau",
            "summary": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nThe npm package \"tar\" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99353",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99351",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9935",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99348",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.84982",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99345",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32804"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32804"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/npm/node-tar",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/npm/node-tar"
                },
                {
                    "reference_url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4"
                },
                {
                    "reference_url": "https://www.npmjs.com/advisories/1770",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/advisories/1770"
                },
                {
                    "reference_url": "https://www.npmjs.com/package/tar",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/package/tar"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409",
                    "reference_id": "1990409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990409"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992111",
                    "reference_id": "992111",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992111"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804",
                    "reference_id": "CVE-2021-32804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32804"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-3jfq-g458-7qm9",
                    "reference_id": "GHSA-3jfq-g458-7qm9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-3jfq-g458-7qm9"
                },
                {
                    "reference_url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9",
                    "reference_id": "GHSA-3jfq-g458-7qm9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5086",
                    "reference_id": "RHSA-2021:5086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5086"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-32804",
                "GHSA-3jfq-g458-7qm9"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9w9-1d4p-vqau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34823?format=api",
            "vulnerability_id": "VCID-ap4u-dkwx-1kb3",
            "summary": "Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71095",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71174",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71104",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71097",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71139",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71151",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71175",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7116",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71143",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71189",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71196",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22931"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1178337",
                    "reference_id": "1178337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1178337"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019",
                    "reference_id": "1993019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993019"
                },
                {
                    "reference_url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/",
                    "reference_id": "aug-2021-security-releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/"
                        }
                    ],
                    "url": "https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2286",
                    "reference_id": "AVG-2286",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2286"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-02",
                    "reference_id": "GLSA-202401-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202401-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-29",
                    "reference_id": "GLSA-202405-29",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-29"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210923-0001/",
                    "reference_id": "ntap-20210923-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210923-0001/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/",
                    "reference_id": "ntap-20211022-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-22931"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ap4u-dkwx-1kb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10991?format=api",
            "vulnerability_id": "VCID-e7n4-x8sc-3bb6",
            "summary": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')\nThe npm package \"tar\" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36834",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36915",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36899",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36848",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3702",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36985",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36829",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36892",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36908",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36863",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36888",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36923",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-32803"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32803"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/isaacs/node-tar",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/isaacs/node-tar"
                },
                {
                    "reference_url": "https://github.com/isaacs/node-tar/commit/46fe35083e2676e31c4e0a81639dce6da7aaa356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/isaacs/node-tar/commit/46fe35083e2676e31c4e0a81639dce6da7aaa356"
                },
                {
                    "reference_url": "https://github.com/isaacs/node-tar/commit/5987d9a41f6bfbf1ddab1098e1fdcf1a5618f571",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/isaacs/node-tar/commit/5987d9a41f6bfbf1ddab1098e1fdcf1a5618f571"
                },
                {
                    "reference_url": "https://github.com/isaacs/node-tar/commit/85d3a942b4064e4ff171f91696fced7975167349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/isaacs/node-tar/commit/85d3a942b4064e4ff171f91696fced7975167349"
                },
                {
                    "reference_url": "https://github.com/isaacs/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/isaacs/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20"
                },
                {
                    "reference_url": "https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20"
                },
                {
                    "reference_url": "https://www.npmjs.com/advisories/1771",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/advisories/1771"
                },
                {
                    "reference_url": "https://www.npmjs.com/package/tar",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/package/tar"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415",
                    "reference_id": "1990415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1990415"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992110",
                    "reference_id": "992110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992110"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803",
                    "reference_id": "CVE-2021-32803",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32803"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r628-mhmh-qjhw",
                    "reference_id": "GHSA-r628-mhmh-qjhw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r628-mhmh-qjhw"
                },
                {
                    "reference_url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw",
                    "reference_id": "GHSA-r628-mhmh-qjhw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5086",
                    "reference_id": "RHSA-2021:5086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5086"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-5283-1/",
                    "reference_id": "USN-USN-5283-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-5283-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-32803",
                "GHSA-r628-mhmh-qjhw"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7n4-x8sc-3bb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41643?format=api",
            "vulnerability_id": "VCID-tsp3-tyjt-h7bk",
            "summary": "Regular Expression Denial of Service in path-parse\nAffected versions of npm package `path-parse` are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23343.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23343",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57466",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57487",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57465",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57484",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57507",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57491",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57354",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57436",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57458",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00349",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57435",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23343"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/jbgutierrez/path-parse",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jbgutierrez/path-parse"
                },
                {
                    "reference_url": "https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7"
                },
                {
                    "reference_url": "https://github.com/jbgutierrez/path-parse/issues/8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jbgutierrez/path-parse/issues/8"
                },
                {
                    "reference_url": "https://github.com/jbgutierrez/path-parse/pull/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/jbgutierrez/path-parse/pull/10"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r6a32cb3eda3b19096ad48ef1e7aa8f26e005f2f63765abb69ce08b85@%3Cdev.myfaces.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23343"
                },
                {
                    "reference_url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028"
                },
                {
                    "reference_url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://snyk.io/vuln/SNYK-JS-PATHPARSE-1077067"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818",
                    "reference_id": "1956818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956818"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hj48-42vr-x3v9",
                    "reference_id": "GHSA-hj48-42vr-x3v9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hj48-42vr-x3v9"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2865",
                    "reference_id": "RHSA-2021:2865",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2865"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280",
                    "reference_id": "RHSA-2021:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281",
                    "reference_id": "RHSA-2021:3281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3281"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623",
                    "reference_id": "RHSA-2021:3623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638",
                    "reference_id": "RHSA-2021:3638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639",
                    "reference_id": "RHSA-2021:3639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666",
                    "reference_id": "RHSA-2021:3666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4902",
                    "reference_id": "RHSA-2021:4902",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4902"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2021-23343",
                "GHSA-hj48-42vr-x3v9"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsp3-tyjt-h7bk"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-5%3Farch=el7"
}