Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-nodejs12-nodejs@12.18.4-3?arch=el7
Typerpm
Namespaceredhat
Namerh-nodejs12-nodejs
Version12.18.4-3
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-4b6t-hfzu-7uf5
vulnerability_id VCID-4b6t-hfzu-7uf5
summary
dot-prop Prototype Pollution vulnerability
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8116.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8116
reference_id
reference_type
scores
0
value 0.00764
scoring_system epss
scoring_elements 0.73479
published_at 2026-04-18T12:55:00Z
1
value 0.00764
scoring_system epss
scoring_elements 0.73432
published_at 2026-04-09T12:55:00Z
2
value 0.00764
scoring_system epss
scoring_elements 0.73471
published_at 2026-04-16T12:55:00Z
3
value 0.00764
scoring_system epss
scoring_elements 0.73428
published_at 2026-04-13T12:55:00Z
4
value 0.00764
scoring_system epss
scoring_elements 0.73436
published_at 2026-04-12T12:55:00Z
5
value 0.00764
scoring_system epss
scoring_elements 0.73455
published_at 2026-04-11T12:55:00Z
6
value 0.00764
scoring_system epss
scoring_elements 0.73378
published_at 2026-04-01T12:55:00Z
7
value 0.00764
scoring_system epss
scoring_elements 0.73387
published_at 2026-04-02T12:55:00Z
8
value 0.00764
scoring_system epss
scoring_elements 0.7341
published_at 2026-04-04T12:55:00Z
9
value 0.00764
scoring_system epss
scoring_elements 0.73382
published_at 2026-04-07T12:55:00Z
10
value 0.00764
scoring_system epss
scoring_elements 0.73419
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8116
3
reference_url https://github.com/advisories/GHSA-ff7x-qrg7-qggm
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-ff7x-qrg7-qggm
4
reference_url https://github.com/sindresorhus/dot-prop
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/dot-prop
5
reference_url https://github.com/sindresorhus/dot-prop/commit/3039c8c07f6fdaa8b595ec869ae0895686a7a0f2
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/dot-prop/commit/3039c8c07f6fdaa8b595ec869ae0895686a7a0f2
6
reference_url https://github.com/sindresorhus/dot-prop/commit/c914124f418f55edea27928e89c94d931babe587
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/dot-prop/commit/c914124f418f55edea27928e89c94d931babe587
7
reference_url https://github.com/sindresorhus/dot-prop/issues/63
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/dot-prop/issues/63
8
reference_url https://github.com/sindresorhus/dot-prop/tree/v4
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/dot-prop/tree/v4
9
reference_url https://hackerone.com/reports/719856
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/719856
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8116
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8116
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868196
reference_id 1868196
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868196
12
reference_url https://access.redhat.com/errata/RHSA-2020:4272
reference_id RHSA-2020:4272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4272
13
reference_url https://access.redhat.com/errata/RHSA-2020:4903
reference_id RHSA-2020:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4903
14
reference_url https://access.redhat.com/errata/RHSA-2020:5086
reference_id RHSA-2020:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5086
15
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
16
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
fixed_packages
aliases CVE-2020-8116, GHSA-ff7x-qrg7-qggm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4b6t-hfzu-7uf5
1
url VCID-cqs6-2ryh-43gj
vulnerability_id VCID-cqs6-2ryh-43gj
summary
A buffer overflow in libuv might allow remote attacker(s) to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8252.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8252
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39608
published_at 2026-04-01T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39757
published_at 2026-04-02T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39779
published_at 2026-04-04T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39698
published_at 2026-04-07T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39752
published_at 2026-04-08T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39766
published_at 2026-04-09T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39776
published_at 2026-04-11T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.3974
published_at 2026-04-12T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39724
published_at 2026-04-13T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39774
published_at 2026-04-16T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39745
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8252
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879315
reference_id 1879315
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879315
5
reference_url https://security.gentoo.org/glsa/202009-15
reference_id GLSA-202009-15
reference_type
scores
url https://security.gentoo.org/glsa/202009-15
6
reference_url https://access.redhat.com/errata/RHSA-2020:4272
reference_id RHSA-2020:4272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4272
7
reference_url https://access.redhat.com/errata/RHSA-2020:4903
reference_id RHSA-2020:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4903
8
reference_url https://access.redhat.com/errata/RHSA-2020:5086
reference_id RHSA-2020:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5086
9
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
10
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
11
reference_url https://usn.ubuntu.com/4548-1/
reference_id USN-4548-1
reference_type
scores
url https://usn.ubuntu.com/4548-1/
fixed_packages
aliases CVE-2020-8252
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cqs6-2ryh-43gj
2
url VCID-e2wc-na6c-c3cr
vulnerability_id VCID-e2wc-na6c-c3cr
summary
npm CLI exposing sensitive information through logs
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15095.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15095.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15095
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27686
published_at 2026-04-18T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27803
published_at 2026-04-01T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27853
published_at 2026-04-02T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27894
published_at 2026-04-04T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27685
published_at 2026-04-07T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27753
published_at 2026-04-08T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27796
published_at 2026-04-09T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27802
published_at 2026-04-11T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.2776
published_at 2026-04-12T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27702
published_at 2026-04-13T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27712
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15095
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07
8
reference_url https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc
9
reference_url https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15095
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15095
13
reference_url https://security.gentoo.org/glsa/202101-07
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202101-07
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856875
reference_id 1856875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856875
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964746
reference_id 964746
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964746
16
reference_url https://github.com/advisories/GHSA-93f3-23rq-pjfp
reference_id GHSA-93f3-23rq-pjfp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-93f3-23rq-pjfp
17
reference_url https://access.redhat.com/errata/RHSA-2020:4272
reference_id RHSA-2020:4272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4272
18
reference_url https://access.redhat.com/errata/RHSA-2020:4903
reference_id RHSA-2020:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4903
19
reference_url https://access.redhat.com/errata/RHSA-2020:5086
reference_id RHSA-2020:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5086
20
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
21
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
fixed_packages
aliases CVE-2020-15095, GHSA-93f3-23rq-pjfp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e2wc-na6c-c3cr
3
url VCID-n91z-kugd-ebb5
vulnerability_id VCID-n91z-kugd-ebb5
summary
Multiple vulnerabilities have been found in NodeJS, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8201.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8201
reference_id
reference_type
scores
0
value 0.00632
scoring_system epss
scoring_elements 0.70267
published_at 2026-04-01T12:55:00Z
1
value 0.00632
scoring_system epss
scoring_elements 0.70279
published_at 2026-04-02T12:55:00Z
2
value 0.00632
scoring_system epss
scoring_elements 0.70297
published_at 2026-04-04T12:55:00Z
3
value 0.00632
scoring_system epss
scoring_elements 0.70273
published_at 2026-04-07T12:55:00Z
4
value 0.00632
scoring_system epss
scoring_elements 0.70319
published_at 2026-04-08T12:55:00Z
5
value 0.00632
scoring_system epss
scoring_elements 0.70333
published_at 2026-04-09T12:55:00Z
6
value 0.00632
scoring_system epss
scoring_elements 0.70357
published_at 2026-04-11T12:55:00Z
7
value 0.00632
scoring_system epss
scoring_elements 0.70342
published_at 2026-04-12T12:55:00Z
8
value 0.00632
scoring_system epss
scoring_elements 0.70328
published_at 2026-04-13T12:55:00Z
9
value 0.00632
scoring_system epss
scoring_elements 0.70372
published_at 2026-04-16T12:55:00Z
10
value 0.00632
scoring_system epss
scoring_elements 0.70381
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879311
reference_id 1879311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879311
5
reference_url https://access.redhat.com/errata/RHSA-2020:4272
reference_id RHSA-2020:4272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4272
6
reference_url https://access.redhat.com/errata/RHSA-2020:4903
reference_id RHSA-2020:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4903
7
reference_url https://access.redhat.com/errata/RHSA-2020:5086
reference_id RHSA-2020:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5086
fixed_packages
aliases CVE-2020-8201
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n91z-kugd-ebb5
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs@12.18.4-3%3Farch=el7