Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-tar@4.4.6%2Bds1-3%2Bdeb10u1
Typedeb
Namespacedebian
Namenode-tar
Version4.4.6+ds1-3+deb10u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.2.1+~cs7.0.8-1+deb13u1
Latest_non_vulnerable_version6.2.1+~cs7.0.8-1+deb13u1
Affected_by_vulnerabilities
0
url VCID-1tz4-bphw-rbd3
vulnerability_id VCID-1tz4-bphw-rbd3
summary
Path Traversal
This npm package has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37701.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37701.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37701
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29345
published_at 2026-04-21T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-01T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29519
published_at 2026-04-02T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29567
published_at 2026-04-04T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29388
published_at 2026-04-07T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29452
published_at 2026-04-08T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29492
published_at 2026-04-09T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29495
published_at 2026-04-11T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.2945
published_at 2026-04-12T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29398
published_at 2026-04-13T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29417
published_at 2026-04-16T12:55:00Z
11
value 0.0011
scoring_system epss
scoring_elements 0.2939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37701
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37701
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/npm/node-tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar
7
reference_url https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc
8
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html
9
reference_url https://www.debian.org/security/2021/dsa-5008
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2021/dsa-5008
10
reference_url https://www.npmjs.com/package/tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/tar
11
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1999731
reference_id 1999731
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1999731
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-37701
reference_id CVE-2021-37701
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-37701
14
reference_url https://github.com/advisories/GHSA-9r2w-394v-53qc
reference_id GHSA-9r2w-394v-53qc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9r2w-394v-53qc
15
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
16
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
17
reference_url https://access.redhat.com/errata/RHSA-2022:0041
reference_id RHSA-2022:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0041
18
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
19
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
20
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
fixed_packages
0
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2
aliases CVE-2021-37701, GHSA-9r2w-394v-53qc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tz4-bphw-rbd3
1
url VCID-7mtb-yaq7-77ep
vulnerability_id VCID-7mtb-yaq7-77ep
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The npm package "tar" (aka node-tar) has an arbitrary file creation/overwrite and arbitrary code execution vulnerability. node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37712.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37712.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-37712
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24623
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24548
published_at 2026-04-18T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24557
published_at 2026-04-16T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24545
published_at 2026-04-13T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.246
published_at 2026-04-12T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24643
published_at 2026-04-11T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24626
published_at 2026-04-09T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.2458
published_at 2026-04-08T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24509
published_at 2026-04-07T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24737
published_at 2026-04-04T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.24698
published_at 2026-04-02T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24523
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-37712
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37701
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/isaacs/node-tar/commit/1739408d3122af897caefd09662bce2ea477533b
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/1739408d3122af897caefd09662bce2ea477533b
7
reference_url https://github.com/isaacs/node-tar/commit/2f1bca027286c23e110b8dfc7efc10756fa3db5a
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/2f1bca027286c23e110b8dfc7efc10756fa3db5a
8
reference_url https://github.com/isaacs/node-tar/commit/3aaf19b2501bbddb145d92b3322c80dcaed3c35f
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/3aaf19b2501bbddb145d92b3322c80dcaed3c35f
9
reference_url https://github.com/isaacs/node-tar/commit/b6162c7fafe797f856564ef37f4b82747f051455
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/b6162c7fafe797f856564ef37f4b82747f051455
10
reference_url https://github.com/isaacs/node-tar/commit/bb93ba243746f705092905da1955ac3b0509ba1e
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/bb93ba243746f705092905da1955ac3b0509ba1e
11
reference_url https://github.com/isaacs/node-tar/commit/d56f790bda9fea807dd80c5083f24771dbdd6eb1
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/d56f790bda9fea807dd80c5083f24771dbdd6eb1
12
reference_url https://github.com/npm/node-tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar
13
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/12/msg00023.html
14
reference_url https://www.debian.org/security/2021/dsa-5008
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2021/dsa-5008
15
reference_url https://www.npmjs.com/package/tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/tar
16
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1999739
reference_id 1999739
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1999739
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993981
reference_id 993981
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993981
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-37712
reference_id CVE-2021-37712
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-37712
20
reference_url https://github.com/advisories/GHSA-qq89-hq3f-393p
reference_id GHSA-qq89-hq3f-393p
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qq89-hq3f-393p
21
reference_url https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
reference_id GHSA-qq89-hq3f-393p
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p
22
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
23
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
24
reference_url https://access.redhat.com/errata/RHSA-2022:0041
reference_id RHSA-2022:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0041
25
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
26
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
27
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
fixed_packages
0
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2
aliases CVE-2021-37712, GHSA-qq89-hq3f-393p
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7mtb-yaq7-77ep
2
url VCID-a9w9-1d4p-vqau
vulnerability_id VCID-a9w9-1d4p-vqau
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute file paths contained in a tar file. For example `/home/user/.bashrc` would turn into `home/user/.bashrc`. This logic was insufficient when file paths contained repeated path roots such as `////home/user/.bashrc`. `node-tar` would only strip a single path root from such paths. When given an absolute file path with repeating path roots, the resulting path (e.g. `///home/user/.bashrc`) would still resolve to an absolute path, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.2, 4.4.14, 5.0.6 and 6.1.1. Users may work around this vulnerability without upgrading by creating a custom `onentry` method which sanitizes the `entry.path` or a `filter` method which removes entries with absolute paths. See referenced GitHub Advisory for details. Be aware of CVE-2021-32803 which fixes a similar bug in later versions of tar.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32804.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32804
reference_id
reference_type
scores
0
value 0.84982
scoring_system epss
scoring_elements 0.99346
published_at 2026-04-07T12:55:00Z
1
value 0.84982
scoring_system epss
scoring_elements 0.99353
published_at 2026-04-21T12:55:00Z
2
value 0.84982
scoring_system epss
scoring_elements 0.99354
published_at 2026-04-18T12:55:00Z
3
value 0.84982
scoring_system epss
scoring_elements 0.99351
published_at 2026-04-13T12:55:00Z
4
value 0.84982
scoring_system epss
scoring_elements 0.9935
published_at 2026-04-11T12:55:00Z
5
value 0.84982
scoring_system epss
scoring_elements 0.99348
published_at 2026-04-09T12:55:00Z
6
value 0.84982
scoring_system epss
scoring_elements 0.99343
published_at 2026-04-02T12:55:00Z
7
value 0.84982
scoring_system epss
scoring_elements 0.99345
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32804
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32804
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/npm/node-tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar
6
reference_url https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
7
reference_url https://www.npmjs.com/advisories/1770
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/1770
8
reference_url https://www.npmjs.com/package/tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/tar
9
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1990409
reference_id 1990409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1990409
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992111
reference_id 992111
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992111
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-32804
reference_id CVE-2021-32804
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-32804
13
reference_url https://github.com/advisories/GHSA-3jfq-g458-7qm9
reference_id GHSA-3jfq-g458-7qm9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3jfq-g458-7qm9
14
reference_url https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
reference_id GHSA-3jfq-g458-7qm9
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
15
reference_url https://access.redhat.com/errata/RHSA-2021:3280
reference_id RHSA-2021:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3280
16
reference_url https://access.redhat.com/errata/RHSA-2021:3281
reference_id RHSA-2021:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3281
17
reference_url https://access.redhat.com/errata/RHSA-2021:3623
reference_id RHSA-2021:3623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3623
18
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
19
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
20
reference_url https://access.redhat.com/errata/RHSA-2021:3666
reference_id RHSA-2021:3666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3666
21
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
fixed_packages
0
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2
aliases CVE-2021-32804, GHSA-3jfq-g458-7qm9
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9w9-1d4p-vqau
3
url VCID-e7n4-x8sc-3bb6
vulnerability_id VCID-e7n4-x8sc-3bb6
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary `stat` calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory. This order of operations resulted in the directory being created and added to the `node-tar` directory cache. When a directory is present in the directory cache, subsequent calls to mkdir for that directory are skipped. However, this is also where `node-tar` checks for symlinks occur. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass `node-tar` symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. This issue was addressed in releases 3.2.3, 4.4.15, 5.0.7 and 6.1.2.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32803.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-32803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-32803
reference_id
reference_type
scores
0
value 0.0016
scoring_system epss
scoring_elements 0.36834
published_at 2026-04-21T12:55:00Z
1
value 0.0016
scoring_system epss
scoring_elements 0.36915
published_at 2026-04-09T12:55:00Z
2
value 0.0016
scoring_system epss
scoring_elements 0.36899
published_at 2026-04-08T12:55:00Z
3
value 0.0016
scoring_system epss
scoring_elements 0.36848
published_at 2026-04-07T12:55:00Z
4
value 0.0016
scoring_system epss
scoring_elements 0.3702
published_at 2026-04-04T12:55:00Z
5
value 0.0016
scoring_system epss
scoring_elements 0.36985
published_at 2026-04-02T12:55:00Z
6
value 0.0016
scoring_system epss
scoring_elements 0.36829
published_at 2026-04-01T12:55:00Z
7
value 0.0016
scoring_system epss
scoring_elements 0.36892
published_at 2026-04-18T12:55:00Z
8
value 0.0016
scoring_system epss
scoring_elements 0.36908
published_at 2026-04-16T12:55:00Z
9
value 0.0016
scoring_system epss
scoring_elements 0.36863
published_at 2026-04-13T12:55:00Z
10
value 0.0016
scoring_system epss
scoring_elements 0.36888
published_at 2026-04-12T12:55:00Z
11
value 0.0016
scoring_system epss
scoring_elements 0.36923
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-32803
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32803
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/isaacs/node-tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar
6
reference_url https://github.com/isaacs/node-tar/commit/46fe35083e2676e31c4e0a81639dce6da7aaa356
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/46fe35083e2676e31c4e0a81639dce6da7aaa356
7
reference_url https://github.com/isaacs/node-tar/commit/5987d9a41f6bfbf1ddab1098e1fdcf1a5618f571
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/5987d9a41f6bfbf1ddab1098e1fdcf1a5618f571
8
reference_url https://github.com/isaacs/node-tar/commit/85d3a942b4064e4ff171f91696fced7975167349
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/85d3a942b4064e4ff171f91696fced7975167349
9
reference_url https://github.com/isaacs/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
10
reference_url https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20
11
reference_url https://www.npmjs.com/advisories/1771
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/1771
12
reference_url https://www.npmjs.com/package/tar
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/tar
13
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1990415
reference_id 1990415
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1990415
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992110
reference_id 992110
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992110
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-32803
reference_id CVE-2021-32803
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-32803
17
reference_url https://github.com/advisories/GHSA-r628-mhmh-qjhw
reference_id GHSA-r628-mhmh-qjhw
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r628-mhmh-qjhw
18
reference_url https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
reference_id GHSA-r628-mhmh-qjhw
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw
19
reference_url https://access.redhat.com/errata/RHSA-2021:3280
reference_id RHSA-2021:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3280
20
reference_url https://access.redhat.com/errata/RHSA-2021:3281
reference_id RHSA-2021:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3281
21
reference_url https://access.redhat.com/errata/RHSA-2021:3623
reference_id RHSA-2021:3623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3623
22
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
23
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
24
reference_url https://access.redhat.com/errata/RHSA-2021:3666
reference_id RHSA-2021:3666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3666
25
reference_url https://access.redhat.com/errata/RHSA-2021:5086
reference_id RHSA-2021:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5086
26
reference_url https://usn.ubuntu.com/USN-5283-1/
reference_id USN-USN-5283-1
reference_type
scores
url https://usn.ubuntu.com/USN-5283-1/
fixed_packages
0
url pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
purl pkg:deb/debian/node-tar@6.0.5%2Bds1%2B~cs11.3.9-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5wr3-7131-u3aa
1
vulnerability VCID-bj4b-gq5e-2kfy
2
vulnerability VCID-fqmy-jhdk-xfhw
3
vulnerability VCID-jj22-rfbv-bkg3
4
vulnerability VCID-qunt-xms1-a3cc
5
vulnerability VCID-xqpk-t1d2-yqak
6
vulnerability VCID-yy79-dbn9-7bd5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@6.0.5%252Bds1%252B~cs11.3.9-1%252Bdeb11u2
aliases CVE-2021-32803, GHSA-r628-mhmh-qjhw
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7n4-x8sc-3bb6
Fixing_vulnerabilities
0
url VCID-mr9t-dr17-w3ah
vulnerability_id VCID-mr9t-dr17-w3ah
summary
Improper Link Resolution Before File Access ('Link Following')
A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2).
references
0
reference_url https://access.redhat.com/errata/RHSA-2019:1821
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1821
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20834.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20834.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20834
reference_id
reference_type
scores
0
value 0.00719
scoring_system epss
scoring_elements 0.72492
published_at 2026-04-16T12:55:00Z
1
value 0.00719
scoring_system epss
scoring_elements 0.72451
published_at 2026-04-13T12:55:00Z
2
value 0.00719
scoring_system epss
scoring_elements 0.7246
published_at 2026-04-12T12:55:00Z
3
value 0.00719
scoring_system epss
scoring_elements 0.72478
published_at 2026-04-11T12:55:00Z
4
value 0.00719
scoring_system epss
scoring_elements 0.72455
published_at 2026-04-09T12:55:00Z
5
value 0.00719
scoring_system epss
scoring_elements 0.72443
published_at 2026-04-08T12:55:00Z
6
value 0.00719
scoring_system epss
scoring_elements 0.7249
published_at 2026-04-21T12:55:00Z
7
value 0.00719
scoring_system epss
scoring_elements 0.72501
published_at 2026-04-18T12:55:00Z
8
value 0.00719
scoring_system epss
scoring_elements 0.72409
published_at 2026-04-02T12:55:00Z
9
value 0.00719
scoring_system epss
scoring_elements 0.72404
published_at 2026-04-07T12:55:00Z
10
value 0.00719
scoring_system epss
scoring_elements 0.72427
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20834
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20834
4
reference_url https://github.com/isaacs/node-tar
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/isaacs/node-tar
5
reference_url https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d
6
reference_url https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8
7
reference_url https://github.com/npm/node-tar/commits/v2.2.2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/commits/v2.2.2
8
reference_url https://github.com/npm/node-tar/compare/58a8d43...a5f7779
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/node-tar/compare/58a8d43...a5f7779
9
reference_url https://hackerone.com/reports/344595
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://hackerone.com/reports/344595
10
reference_url https://www.npmjs.com/advisories/803
reference_id
reference_type
scores
url https://www.npmjs.com/advisories/803
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1702338
reference_id 1702338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1702338
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20834
reference_id CVE-2018-20834
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-20834
13
reference_url https://github.com/advisories/GHSA-j44m-qm6p-hp7m
reference_id GHSA-j44m-qm6p-hp7m
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j44m-qm6p-hp7m
fixed_packages
0
url pkg:deb/debian/node-tar@4.4.6%2Bds1-3%2Bdeb10u1
purl pkg:deb/debian/node-tar@4.4.6%2Bds1-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tz4-bphw-rbd3
1
vulnerability VCID-7mtb-yaq7-77ep
2
vulnerability VCID-a9w9-1d4p-vqau
3
vulnerability VCID-e7n4-x8sc-3bb6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@4.4.6%252Bds1-3%252Bdeb10u1
aliases CVE-2018-20834, GHSA-j44m-qm6p-hp7m
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mr9t-dr17-w3ah
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-tar@4.4.6%252Bds1-3%252Bdeb10u1