Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/libxslt@1.1.35-r0?arch=x86_64&distroversion=v3.12&reponame=main
Typeapk
Namespacealpine
Namelibxslt
Version1.1.35-r0
Qualifiers
arch x86_64
distroversion v3.12
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-nxyn-eknv-tqbf
vulnerability_id VCID-nxyn-eknv-tqbf
summary
Use After Free
Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30560
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24478
published_at 2026-04-08T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24446
published_at 2026-04-18T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24451
published_at 2026-04-16T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24479
published_at 2026-04-01T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24436
published_at 2026-04-13T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24493
published_at 2026-04-12T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24537
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24634
published_at 2026-04-04T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24409
published_at 2026-04-07T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24522
published_at 2026-04-09T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24597
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30560
1
reference_url https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html
2
reference_url https://crbug.com/1219209
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://crbug.com/1219209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30560
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-30560.yml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-30560.yml
6
reference_url https://github.com/sparklemotion/nokogiri
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sparklemotion/nokogiri
7
reference_url https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2
8
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00010.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/09/msg00010.html
9
reference_url https://www.debian.org/security/2022/dsa-5216
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2022/dsa-5216
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079
reference_id 990079
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990079
11
reference_url https://security.archlinux.org/ASA-202107-30
reference_id ASA-202107-30
reference_type
scores
url https://security.archlinux.org/ASA-202107-30
12
reference_url https://security.archlinux.org/ASA-202107-31
reference_id ASA-202107-31
reference_type
scores
url https://security.archlinux.org/ASA-202107-31
13
reference_url https://security.archlinux.org/AVG-2166
reference_id AVG-2166
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2166
14
reference_url https://security.archlinux.org/AVG-2167
reference_id AVG-2167
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2167
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-30560
reference_id CVE-2021-30560
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-30560
16
reference_url https://github.com/advisories/GHSA-59gp-qqm7-cw4j
reference_id GHSA-59gp-qqm7-cw4j
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-59gp-qqm7-cw4j
17
reference_url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2
reference_id GHSA-fq42-c5rg-92c2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2
18
reference_url https://security.gentoo.org/glsa/202107-49
reference_id GLSA-202107-49
reference_type
scores
url https://security.gentoo.org/glsa/202107-49
19
reference_url https://security.gentoo.org/glsa/202310-23
reference_id GLSA-202310-23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202310-23
20
reference_url https://usn.ubuntu.com/5575-1/
reference_id USN-5575-1
reference_type
scores
url https://usn.ubuntu.com/5575-1/
21
reference_url https://usn.ubuntu.com/5575-2/
reference_id USN-5575-2
reference_type
scores
url https://usn.ubuntu.com/5575-2/
fixed_packages
0
url pkg:apk/alpine/libxslt@1.1.35-r0?arch=x86_64&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/libxslt@1.1.35-r0?arch=x86_64&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libxslt@1.1.35-r0%3Farch=x86_64&distroversion=v3.12&reponame=main
aliases CVE-2021-30560, GHSA-59gp-qqm7-cw4j
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nxyn-eknv-tqbf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/libxslt@1.1.35-r0%3Farch=x86_64&distroversion=v3.12&reponame=main