Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
Typeapk
Namespacealpine
Namenodejs
Version12.22.10-r0
Qualifiers
arch ppc64le
distroversion v3.12
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5cf7-va9h-h3gy
vulnerability_id VCID-5cf7-va9h-h3gy
summary
Improper Certificate Validation
Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js does not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44531.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44531
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22783
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22952
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22996
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22789
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22863
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22916
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22936
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22899
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22843
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22856
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://hackerone.com/reports/1429694
reference_id
reference_type
scores
url https://hackerone.com/reports/1429694
10
reference_url https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
reference_id
reference_type
scores
url https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
11
reference_url https://security.netapp.com/advisory/ntap-20220325-0007/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220325-0007/
12
reference_url https://www.debian.org/security/2022/dsa-5170
reference_id
reference_type
scores
url https://www.debian.org/security/2022/dsa-5170
13
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2022.html
14
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2022.html
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
reference_id 1004177
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040839
reference_id 2040839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040839
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-44531
reference_id CVE-2021-44531
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-44531
18
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
19
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
20
reference_url https://access.redhat.com/errata/RHSA-2022:7044
reference_id RHSA-2022:7044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7044
21
reference_url https://access.redhat.com/errata/RHSA-2022:7830
reference_id RHSA-2022:7830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7830
22
reference_url https://access.redhat.com/errata/RHSA-2022:9073
reference_id RHSA-2022:9073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9073
23
reference_url https://access.redhat.com/errata/RHSA-2023:1742
reference_id RHSA-2023:1742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1742
24
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
fixed_packages
0
url pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@12.22.10-r0%3Farch=ppc64le&distroversion=v3.12&reponame=main
aliases CVE-2021-44531
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cf7-va9h-h3gy
1
url VCID-e18p-c3m9-2qgy
vulnerability_id VCID-e18p-c3m9-2qgy
summary Multiple vulnerabilities have been discovered in Node.js.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44532.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44532.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44532
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32731
published_at 2026-04-01T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-02T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32897
published_at 2026-04-04T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32718
published_at 2026-04-07T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32765
published_at 2026-04-08T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32792
published_at 2026-04-09T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32794
published_at 2026-04-11T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32756
published_at 2026-04-12T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.3273
published_at 2026-04-13T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32771
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44532
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
reference_id 1004177
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040846
reference_id 2040846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040846
11
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
12
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
13
reference_url https://access.redhat.com/errata/RHSA-2022:7044
reference_id RHSA-2022:7044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7044
14
reference_url https://access.redhat.com/errata/RHSA-2022:7830
reference_id RHSA-2022:7830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7830
15
reference_url https://access.redhat.com/errata/RHSA-2022:9073
reference_id RHSA-2022:9073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9073
16
reference_url https://access.redhat.com/errata/RHSA-2023:1742
reference_id RHSA-2023:1742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1742
17
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
fixed_packages
0
url pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@12.22.10-r0%3Farch=ppc64le&distroversion=v3.12&reponame=main
aliases CVE-2021-44532
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e18p-c3m9-2qgy
2
url VCID-gwyr-ac4e-dqfa
vulnerability_id VCID-gwyr-ac4e-dqfa
summary
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
The llhttp parser accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22959.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22959.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22959
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43692
published_at 2026-04-01T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43791
published_at 2026-04-16T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43746
published_at 2026-04-12T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.4373
published_at 2026-04-13T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43747
published_at 2026-04-02T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43772
published_at 2026-04-04T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43706
published_at 2026-04-07T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43756
published_at 2026-04-08T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43759
published_at 2026-04-09T12:55:00Z
9
value 0.00212
scoring_system epss
scoring_elements 0.43779
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22959
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://hackerone.com/reports/1238709
reference_id
reference_type
scores
url https://hackerone.com/reports/1238709
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014057
reference_id 2014057
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014057
11
reference_url https://security.archlinux.org/ASA-202110-4
reference_id ASA-202110-4
reference_type
scores
url https://security.archlinux.org/ASA-202110-4
12
reference_url https://security.archlinux.org/AVG-2460
reference_id AVG-2460
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2460
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22959
reference_id CVE-2021-22959
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22959
14
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
15
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
16
reference_url https://access.redhat.com/errata/RHSA-2022:0041
reference_id RHSA-2022:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0041
17
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
18
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
19
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
fixed_packages
0
url pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@12.22.10-r0%3Farch=ppc64le&distroversion=v3.12&reponame=main
aliases CVE-2021-22959
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwyr-ac4e-dqfa
3
url VCID-m5ae-uc68-d3g2
vulnerability_id VCID-m5ae-uc68-d3g2
summary
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
This advisory has been marked as a false positive.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21824.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21824
reference_id
reference_type
scores
0
value 0.00505
scoring_system epss
scoring_elements 0.66171
published_at 2026-04-02T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.71033
published_at 2026-04-07T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.71076
published_at 2026-04-08T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71088
published_at 2026-04-09T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71111
published_at 2026-04-11T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71096
published_at 2026-04-12T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.7108
published_at 2026-04-13T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71126
published_at 2026-04-16T12:55:00Z
8
value 0.0066
scoring_system epss
scoring_elements 0.71058
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://hackerone.com/reports/1431042
reference_id
reference_type
scores
url https://hackerone.com/reports/1431042
10
reference_url https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
reference_id
reference_type
scores
url https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/
11
reference_url https://security.netapp.com/advisory/ntap-20220325-0007/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220325-0007/
12
reference_url https://security.netapp.com/advisory/ntap-20220729-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20220729-0004/
13
reference_url https://www.debian.org/security/2022/dsa-5170
reference_id
reference_type
scores
url https://www.debian.org/security/2022/dsa-5170
14
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2022.html
15
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujul2022.html
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
reference_id 1004177
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040862
reference_id 2040862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040862
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-21824
reference_id CVE-2022-21824
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-21824
19
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
20
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
21
reference_url https://access.redhat.com/errata/RHSA-2022:7044
reference_id RHSA-2022:7044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7044
22
reference_url https://access.redhat.com/errata/RHSA-2022:7830
reference_id RHSA-2022:7830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7830
23
reference_url https://access.redhat.com/errata/RHSA-2022:9073
reference_id RHSA-2022:9073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9073
24
reference_url https://access.redhat.com/errata/RHSA-2023:1742
reference_id RHSA-2023:1742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1742
25
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
fixed_packages
0
url pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@12.22.10-r0%3Farch=ppc64le&distroversion=v3.12&reponame=main
aliases CVE-2022-21824
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5ae-uc68-d3g2
4
url VCID-ms5y-gp7v-2qay
vulnerability_id VCID-ms5y-gp7v-2qay
summary Multiple vulnerabilities have been discovered in Node.js.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44533.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44533
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.61846
published_at 2026-04-01T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.6192
published_at 2026-04-07T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.6195
published_at 2026-04-04T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.61969
published_at 2026-04-08T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.61987
published_at 2026-04-09T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.62008
published_at 2026-04-11T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.61997
published_at 2026-04-12T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.61977
published_at 2026-04-13T12:55:00Z
8
value 0.00421
scoring_system epss
scoring_elements 0.62019
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
reference_id 1004177
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040856
reference_id 2040856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040856
11
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
12
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
13
reference_url https://access.redhat.com/errata/RHSA-2022:7044
reference_id RHSA-2022:7044
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7044
14
reference_url https://access.redhat.com/errata/RHSA-2022:7830
reference_id RHSA-2022:7830
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7830
15
reference_url https://access.redhat.com/errata/RHSA-2022:9073
reference_id RHSA-2022:9073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9073
16
reference_url https://access.redhat.com/errata/RHSA-2023:1742
reference_id RHSA-2023:1742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1742
17
reference_url https://access.redhat.com/errata/RHSA-2023:3742
reference_id RHSA-2023:3742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3742
fixed_packages
0
url pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@12.22.10-r0%3Farch=ppc64le&distroversion=v3.12&reponame=main
aliases CVE-2021-44533
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ms5y-gp7v-2qay
5
url VCID-tnhd-rr89-9udh
vulnerability_id VCID-tnhd-rr89-9udh
summary
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
The parse function in llhttp ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22960.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22960.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22960
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45642
published_at 2026-04-01T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45779
published_at 2026-04-16T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45751
published_at 2026-04-11T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45721
published_at 2026-04-12T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45709
published_at 2026-04-02T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45729
published_at 2026-04-13T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45677
published_at 2026-04-07T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45733
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22960
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://hackerone.com/reports/1238099
reference_id
reference_type
scores
url https://hackerone.com/reports/1238099
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2014059
reference_id 2014059
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2014059
11
reference_url https://security.archlinux.org/ASA-202110-4
reference_id ASA-202110-4
reference_type
scores
url https://security.archlinux.org/ASA-202110-4
12
reference_url https://security.archlinux.org/AVG-2460
reference_id AVG-2460
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2460
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22960
reference_id CVE-2021-22960
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22960
14
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
15
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
16
reference_url https://access.redhat.com/errata/RHSA-2022:0041
reference_id RHSA-2022:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0041
17
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
18
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
19
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
fixed_packages
0
url pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/nodejs@12.22.10-r0?arch=ppc64le&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@12.22.10-r0%3Farch=ppc64le&distroversion=v3.12&reponame=main
aliases CVE-2021-22960
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tnhd-rr89-9udh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@12.22.10-r0%3Farch=ppc64le&distroversion=v3.12&reponame=main