Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libuv1@1.40.0-2%2Bdeb11u1
Typedeb
Namespacedebian
Namelibuv1
Version1.40.0-2+deb11u1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cqs6-2ryh-43gj
vulnerability_id VCID-cqs6-2ryh-43gj
summary
A buffer overflow in libuv might allow remote attacker(s) to
    execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8252.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8252
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39608
published_at 2026-04-01T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39757
published_at 2026-04-02T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39779
published_at 2026-04-04T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39698
published_at 2026-04-07T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39752
published_at 2026-04-08T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39766
published_at 2026-04-09T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39776
published_at 2026-04-11T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.3974
published_at 2026-04-12T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39724
published_at 2026-04-13T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39774
published_at 2026-04-16T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39745
published_at 2026-04-18T12:55:00Z
11
value 0.00181
scoring_system epss
scoring_elements 0.39661
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8252
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8252
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879315
reference_id 1879315
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879315
5
reference_url https://security.gentoo.org/glsa/202009-15
reference_id GLSA-202009-15
reference_type
scores
url https://security.gentoo.org/glsa/202009-15
6
reference_url https://access.redhat.com/errata/RHSA-2020:4272
reference_id RHSA-2020:4272
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4272
7
reference_url https://access.redhat.com/errata/RHSA-2020:4903
reference_id RHSA-2020:4903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4903
8
reference_url https://access.redhat.com/errata/RHSA-2020:5086
reference_id RHSA-2020:5086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5086
9
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
10
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
11
reference_url https://usn.ubuntu.com/4548-1/
reference_id USN-4548-1
reference_type
scores
url https://usn.ubuntu.com/4548-1/
fixed_packages
0
url pkg:deb/debian/libuv1@1.40.0-2%2Bdeb11u1
purl pkg:deb/debian/libuv1@1.40.0-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libuv1@1.40.0-2%252Bdeb11u1
aliases CVE-2020-8252
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cqs6-2ryh-43gj
1
url VCID-nj6f-gujk-wqah
vulnerability_id VCID-nj6f-gujk-wqah
summary A buffer overread vulnerability has been found in libuv.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22918.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22918
reference_id
reference_type
scores
0
value 0.00718
scoring_system epss
scoring_elements 0.72392
published_at 2026-04-07T12:55:00Z
1
value 0.00718
scoring_system epss
scoring_elements 0.72478
published_at 2026-04-21T12:55:00Z
2
value 0.00718
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-16T12:55:00Z
3
value 0.00718
scoring_system epss
scoring_elements 0.72489
published_at 2026-04-18T12:55:00Z
4
value 0.00718
scoring_system epss
scoring_elements 0.72397
published_at 2026-04-02T12:55:00Z
5
value 0.00718
scoring_system epss
scoring_elements 0.72415
published_at 2026-04-04T12:55:00Z
6
value 0.00718
scoring_system epss
scoring_elements 0.72431
published_at 2026-04-08T12:55:00Z
7
value 0.00718
scoring_system epss
scoring_elements 0.72443
published_at 2026-04-09T12:55:00Z
8
value 0.00718
scoring_system epss
scoring_elements 0.72466
published_at 2026-04-11T12:55:00Z
9
value 0.00718
scoring_system epss
scoring_elements 0.72448
published_at 2026-04-12T12:55:00Z
10
value 0.00718
scoring_system epss
scoring_elements 0.72438
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1979338
reference_id 1979338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1979338
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990561
reference_id 990561
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990561
5
reference_url https://security.archlinux.org/ASA-202107-13
reference_id ASA-202107-13
reference_type
scores
url https://security.archlinux.org/ASA-202107-13
6
reference_url https://security.archlinux.org/ASA-202107-36
reference_id ASA-202107-36
reference_type
scores
url https://security.archlinux.org/ASA-202107-36
7
reference_url https://security.archlinux.org/AVG-2126
reference_id AVG-2126
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2126
8
reference_url https://security.archlinux.org/AVG-2131
reference_id AVG-2131
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2131
9
reference_url https://security.gentoo.org/glsa/202401-23
reference_id GLSA-202401-23
reference_type
scores
url https://security.gentoo.org/glsa/202401-23
10
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
11
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
12
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
13
reference_url https://access.redhat.com/errata/RHSA-2021:3073
reference_id RHSA-2021:3073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3073
14
reference_url https://access.redhat.com/errata/RHSA-2021:3074
reference_id RHSA-2021:3074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3074
15
reference_url https://access.redhat.com/errata/RHSA-2021:3075
reference_id RHSA-2021:3075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3075
16
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
17
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
18
reference_url https://usn.ubuntu.com/5007-1/
reference_id USN-5007-1
reference_type
scores
url https://usn.ubuntu.com/5007-1/
fixed_packages
0
url pkg:deb/debian/libuv1@1.24.1-1%2Bdeb10u1
purl pkg:deb/debian/libuv1@1.24.1-1%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cqs6-2ryh-43gj
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-z4r8-dxa1-qyfa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libuv1@1.24.1-1%252Bdeb10u1
1
url pkg:deb/debian/libuv1@1.40.0-2%2Bdeb11u1
purl pkg:deb/debian/libuv1@1.40.0-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libuv1@1.40.0-2%252Bdeb11u1
aliases CVE-2021-22918
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj6f-gujk-wqah
2
url VCID-z4r8-dxa1-qyfa
vulnerability_id VCID-z4r8-dxa1-qyfa
summary A vulnerability has been discovered in libuv, where hostname truncation can lead to attacker-controlled lookups.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24806.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-24806
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40322
published_at 2026-04-21T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40354
published_at 2026-04-07T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40405
published_at 2026-04-08T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40417
published_at 2026-04-09T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40437
published_at 2026-04-11T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40399
published_at 2026-04-12T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.4038
published_at 2026-04-13T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40428
published_at 2026-04-16T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40397
published_at 2026-04-18T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.41063
published_at 2026-04-04T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.41032
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-24806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/libuv/libuv/commit/0f2d7e784a256b54b2385043438848047bc2a629
reference_id 0f2d7e784a256b54b2385043438848047bc2a629
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://github.com/libuv/libuv/commit/0f2d7e784a256b54b2385043438848047bc2a629
5
reference_url http://www.openwall.com/lists/oss-security/2024/02/11/1
reference_id 1
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url http://www.openwall.com/lists/oss-security/2024/02/11/1
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063484
reference_id 1063484
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1063484
7
reference_url http://www.openwall.com/lists/oss-security/2024/02/08/2
reference_id 2
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url http://www.openwall.com/lists/oss-security/2024/02/08/2
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2263292
reference_id 2263292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2263292
9
reference_url https://gitlab.kitware.com/cmake/cmake/-/issues/26112
reference_id 26112
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://gitlab.kitware.com/cmake/cmake/-/issues/26112
10
reference_url https://github.com/libuv/libuv/commit/3530bcc30350d4a6ccf35d2f7b33e23292b9de70
reference_id 3530bcc30350d4a6ccf35d2f7b33e23292b9de70
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://github.com/libuv/libuv/commit/3530bcc30350d4a6ccf35d2f7b33e23292b9de70
11
reference_url https://github.com/libuv/libuv/commit/c858a147643de38a09dd4164758ae5b685f2b488
reference_id c858a147643de38a09dd4164758ae5b685f2b488
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://github.com/libuv/libuv/commit/c858a147643de38a09dd4164758ae5b685f2b488
12
reference_url https://github.com/libuv/libuv/commit/e0327e1d508b8207c9150b6e582f0adf26213c39
reference_id e0327e1d508b8207c9150b6e582f0adf26213c39
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://github.com/libuv/libuv/commit/e0327e1d508b8207c9150b6e582f0adf26213c39
13
reference_url https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6
reference_id GHSA-f74f-cvh7-c6q6
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6
14
reference_url https://security.gentoo.org/glsa/202501-05
reference_id GLSA-202501-05
reference_type
scores
url https://security.gentoo.org/glsa/202501-05
15
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://lists.debian.org/debian-lts-announce/2024/03/msg00005.html
16
reference_url https://security.netapp.com/advisory/ntap-20240605-0008/
reference_id ntap-20240605-0008
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:41:52Z/
url https://security.netapp.com/advisory/ntap-20240605-0008/
17
reference_url https://access.redhat.com/errata/RHSA-2024:4247
reference_id RHSA-2024:4247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4247
18
reference_url https://access.redhat.com/errata/RHSA-2024:4756
reference_id RHSA-2024:4756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4756
19
reference_url https://access.redhat.com/errata/RHSA-2024:8132
reference_id RHSA-2024:8132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8132
20
reference_url https://usn.ubuntu.com/6666-1/
reference_id USN-6666-1
reference_type
scores
url https://usn.ubuntu.com/6666-1/
fixed_packages
0
url pkg:deb/debian/libuv1@1.40.0-2%2Bdeb11u1
purl pkg:deb/debian/libuv1@1.40.0-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libuv1@1.40.0-2%252Bdeb11u1
aliases CVE-2024-24806
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4r8-dxa1-qyfa
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libuv1@1.40.0-2%252Bdeb11u1