Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/77601?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "type": "ebuild", "namespace": "net-libs", "name": "nodejs", "version": "14.15.1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "15.5.1", "latest_non_vulnerable_version": "22.13.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48671?format=api", "vulnerability_id": "VCID-39c4-njbs-pyeq", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8251.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8251.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8251", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.8966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.89675", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.89677", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.89695", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.897", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.89708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04991", "scoring_system": "epss", "scoring_elements": "0.89706", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8251" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879314", "reference_id": "1879314", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879314" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-8251" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39c4-njbs-pyeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33536?format=api", "vulnerability_id": "VCID-e2wc-na6c-c3cr", "summary": "npm CLI exposing sensitive information through logs\nVersions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15095.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15095.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15095", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27702", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27803", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27853", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27894", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27685", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27796", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27802", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.2776", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15095" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15095" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07" }, { "reference_url": "https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc" }, { "reference_url": "https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15095" }, { "reference_url": "https://security.gentoo.org/glsa/202101-07", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202101-07" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875", "reference_id": "1856875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1856875" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964746", "reference_id": "964746", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=964746" }, { "reference_url": "https://github.com/advisories/GHSA-93f3-23rq-pjfp", "reference_id": "GHSA-93f3-23rq-pjfp", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-93f3-23rq-pjfp" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4272", "reference_id": "RHSA-2020:4272", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4272" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4903", "reference_id": "RHSA-2020:4903", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4903" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5086", "reference_id": "RHSA-2020:5086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0521", "reference_id": "RHSA-2021:0521", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0548", "reference_id": "RHSA-2021:0548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0548" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-15095", "GHSA-93f3-23rq-pjfp" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2wc-na6c-c3cr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35492?format=api", "vulnerability_id": "VCID-m4sn-7wuq-e3cd", "summary": "A Denial of Service vulnerability was discovered in c-ares.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8277.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.59168", "scoring_system": "epss", "scoring_elements": "0.98219", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.59168", "scoring_system": "epss", "scoring_elements": "0.98233", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.59168", "scoring_system": "epss", "scoring_elements": "0.98226", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.59168", "scoring_system": "epss", "scoring_elements": "0.9823", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.59168", "scoring_system": "epss", "scoring_elements": "0.98222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.59168", "scoring_system": "epss", "scoring_elements": "0.98225", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8277" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7WH7W46OZSEUHWBHD7TCH3LRFY52V6Z/" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898554", "reference_id": "1898554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1898554" }, { "reference_url": "https://security.archlinux.org/ASA-202011-18", "reference_id": "ASA-202011-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-18" }, { "reference_url": "https://security.archlinux.org/AVG-1280", "reference_id": "AVG-1280", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1280" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8277", "reference_id": "CVE-2020-8277", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8277" }, { "reference_url": "https://security.gentoo.org/glsa/202012-11", "reference_id": "GLSA-202012-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5305", "reference_id": "RHSA-2020:5305", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5305" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5499", "reference_id": "RHSA-2020:5499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0421", "reference_id": "RHSA-2021:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0551", "reference_id": "RHSA-2021:0551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0551" }, { "reference_url": "https://usn.ubuntu.com/4638-1/", "reference_id": "USN-4638-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4638-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-8277" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m4sn-7wuq-e3cd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48670?format=api", "vulnerability_id": "VCID-n91z-kugd-ebb5", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70267", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70319", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70333", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70357", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70328", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311", "reference_id": "1879311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4272", "reference_id": "RHSA-2020:4272", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4272" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4903", "reference_id": "RHSA-2020:4903", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4903" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5086", "reference_id": "RHSA-2020:5086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5086" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-8201" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n91z-kugd-ebb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48668?format=api", "vulnerability_id": "VCID-xeay-8ec9-4bdd", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.80994", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.81003", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.81027", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.81025", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.81053", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.8106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.81078", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.81064", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01491", "scoring_system": "epss", "scoring_elements": "0.81056", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8174" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256", "reference_id": "1845256", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845256" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962145", "reference_id": "962145", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2847", "reference_id": "RHSA-2020:2847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2848", "reference_id": "RHSA-2020:2848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2849", "reference_id": "RHSA-2020:2849", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2849" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2852", "reference_id": "RHSA-2020:2852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2895", "reference_id": "RHSA-2020:2895", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2895" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3042", "reference_id": "RHSA-2020:3042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3084", "reference_id": "RHSA-2020:3084", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3084" }, { "reference_url": "https://usn.ubuntu.com/6380-1/", "reference_id": "USN-6380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6380-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-8174" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xeay-8ec9-4bdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48666?format=api", "vulnerability_id": "VCID-zckz-447u-gueb", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8172.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8172.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8172", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78718", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78725", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78739", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78771", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01183", "scoring_system": "epss", "scoring_elements": "0.78769", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8172" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247", "reference_id": "1845247", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2847", "reference_id": "RHSA-2020:2847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2852", "reference_id": "RHSA-2020:2852", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2852" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2895", "reference_id": "RHSA-2020:2895", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2895" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-8172" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zckz-447u-gueb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48673?format=api", "vulnerability_id": "VCID-zj4d-e8r7-ufg3", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93694", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93717", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8287" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016690", "reference_id": "1016690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016690" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863", "reference_id": "1912863", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364", "reference_id": "979364", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364" }, { "reference_url": "https://security.archlinux.org/ASA-202101-16", "reference_id": "ASA-202101-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-16" }, { "reference_url": "https://security.archlinux.org/AVG-1400", "reference_id": "AVG-1400", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0421", "reference_id": "RHSA-2021:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0485", "reference_id": "RHSA-2021:0485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0521", "reference_id": "RHSA-2021:0521", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0548", "reference_id": "RHSA-2021:0548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0549", "reference_id": "RHSA-2021:0549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0551", "reference_id": "RHSA-2021:0551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0551" }, { "reference_url": "https://usn.ubuntu.com/5563-1/", "reference_id": "USN-5563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5563-1/" }, { "reference_url": "https://usn.ubuntu.com/6380-1/", "reference_id": "USN-6380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6380-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-8287" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zj4d-e8r7-ufg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48672?format=api", "vulnerability_id": "VCID-ztt4-vnk7-7ycq", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8265.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73197", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73248", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73276", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73255", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73207", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73228", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73251", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854", "reference_id": "1912854", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364", "reference_id": "979364", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364" }, { "reference_url": "https://security.archlinux.org/ASA-202101-16", "reference_id": "ASA-202101-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-16" }, { "reference_url": "https://security.archlinux.org/AVG-1400", "reference_id": "AVG-1400", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0421", "reference_id": "RHSA-2021:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0485", "reference_id": "RHSA-2021:0485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0521", "reference_id": "RHSA-2021:0521", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0548", "reference_id": "RHSA-2021:0548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0549", "reference_id": "RHSA-2021:0549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0551", "reference_id": "RHSA-2021:0551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0551" }, { "reference_url": "https://usn.ubuntu.com/6380-1/", "reference_id": "USN-6380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6380-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77600?format=api", "purl": "pkg:ebuild/net-libs/nodejs@12.20.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@12.20.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77601?format=api", "purl": "pkg:ebuild/net-libs/nodejs@14.15.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/77602?format=api", "purl": "pkg:ebuild/net-libs/nodejs@15.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@15.5.1" } ], "aliases": [ "CVE-2020-8265" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztt4-vnk7-7ycq" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/nodejs@14.15.1" }