Lookup for vulnerable packages by Package URL.

Purlpkg:nuget/jQuery.Validation@1.19.1
Typenuget
Namespace
NamejQuery.Validation
Version1.19.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.19.4
Latest_non_vulnerable_version1.19.4
Affected_by_vulnerabilities
0
url VCID-a286-32jj-eubk
vulnerability_id VCID-a286-32jj-eubk
summary
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.

The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)

This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21252.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21252
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.72032
published_at 2026-04-21T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.72047
published_at 2026-04-18T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.72039
published_at 2026-04-16T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71951
published_at 2026-04-01T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.72014
published_at 2026-04-12T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.7203
published_at 2026-04-11T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-09T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.71993
published_at 2026-04-08T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71955
published_at 2026-04-07T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.71979
published_at 2026-04-04T12:55:00Z
10
value 0.007
scoring_system epss
scoring_elements 0.71959
published_at 2026-04-02T12:55:00Z
11
value 0.007
scoring_system epss
scoring_elements 0.71998
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21252
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21252
3
reference_url https://github.com/jquery-validation/jquery-validation
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jquery-validation/jquery-validation
4
reference_url https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d
5
reference_url https://github.com/jquery-validation/jquery-validation/pull/2371
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jquery-validation/jquery-validation/pull/2371
6
reference_url https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm
7
reference_url https://jqueryvalidation.org/#installation-via-package-managers
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://jqueryvalidation.org/#installation-via-package-managers
8
reference_url https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-21252
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-21252
10
reference_url https://securitylab.github.com/advisories/GHSL-2020-294-redos-jquery-validation
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://securitylab.github.com/advisories/GHSL-2020-294-redos-jquery-validation
11
reference_url https://securitylab.github.com/advisories/GHSL-2020-294-redos-jquery-validation/
reference_id
reference_type
scores
url https://securitylab.github.com/advisories/GHSL-2020-294-redos-jquery-validation/
12
reference_url https://security.netapp.com/advisory/ntap-20210219-0005
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210219-0005
13
reference_url https://security.netapp.com/advisory/ntap-20210219-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210219-0005/
14
reference_url https://www.npmjs.com/package/jquery-validation
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/jquery-validation
15
reference_url https://www.nuget.org/packages/jquery.validation
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/jquery.validation
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2096941
reference_id 2096941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2096941
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980891
reference_id 980891
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980891
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980892
reference_id 980892
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980892
19
reference_url https://github.com/advisories/GHSA-jxwx-85vp-gvwm
reference_id GHSA-jxwx-85vp-gvwm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jxwx-85vp-gvwm
fixed_packages
0
url pkg:nuget/jQuery.Validation@1.19.3
purl pkg:nuget/jQuery.Validation@1.19.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-apr7-9vue-3uhr
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/jQuery.Validation@1.19.3
aliases CVE-2021-21252, GHSA-jxwx-85vp-gvwm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a286-32jj-eubk
1
url VCID-apr7-9vue-3uhr
vulnerability_id VCID-apr7-9vue-3uhr
summary
Regular expression denial of service in jquery-validation
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-43306
reference_id
reference_type
scores
0
value 0.00829
scoring_system epss
scoring_elements 0.74553
published_at 2026-04-21T12:55:00Z
1
value 0.00829
scoring_system epss
scoring_elements 0.7456
published_at 2026-04-18T12:55:00Z
2
value 0.00844
scoring_system epss
scoring_elements 0.74749
published_at 2026-04-04T12:55:00Z
3
value 0.00844
scoring_system epss
scoring_elements 0.74722
published_at 2026-04-07T12:55:00Z
4
value 0.00844
scoring_system epss
scoring_elements 0.74755
published_at 2026-04-08T12:55:00Z
5
value 0.00844
scoring_system epss
scoring_elements 0.74769
published_at 2026-04-09T12:55:00Z
6
value 0.00844
scoring_system epss
scoring_elements 0.74793
published_at 2026-04-11T12:55:00Z
7
value 0.00844
scoring_system epss
scoring_elements 0.74772
published_at 2026-04-12T12:55:00Z
8
value 0.00844
scoring_system epss
scoring_elements 0.74763
published_at 2026-04-13T12:55:00Z
9
value 0.00844
scoring_system epss
scoring_elements 0.74719
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-43306
1
reference_url https://github.com/jquery-validation/jquery-validation
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jquery-validation/jquery-validation
2
reference_url https://github.com/jquery-validation/jquery-validation/commit/69cb17ed774b427f7e2ffcdf197968231725c30e
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jquery-validation/jquery-validation/commit/69cb17ed774b427f7e2ffcdf197968231725c30e
3
reference_url https://github.com/jquery-validation/jquery-validation/pull/2428
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/jquery-validation/jquery-validation/pull/2428
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-43306
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-43306
5
reference_url https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348
reference_id
reference_type
scores
0
value LOW
scoring_system generic_textual
scoring_elements
url https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348
6
reference_url https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/
reference_id
reference_type
scores
url https://research.jfrog.com/vulnerabilities/jquery-validation-redos-xray-211348/
7
reference_url https://github.com/advisories/GHSA-j9m2-h2pv-wvph
reference_id GHSA-j9m2-h2pv-wvph
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-j9m2-h2pv-wvph
fixed_packages
0
url pkg:nuget/jQuery.Validation@1.19.4
purl pkg:nuget/jQuery.Validation@1.19.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/jQuery.Validation@1.19.4
aliases CVE-2021-43306, GHSA-j9m2-h2pv-wvph
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apr7-9vue-3uhr
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nuget/jQuery.Validation@1.19.1