Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-ajv@6.12.4-1?distro=trixie
Typedeb
Namespacedebian
Namenode-ajv
Version6.12.4-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.18.0~ds+~cs6.1.1-1
Latest_non_vulnerable_version8.18.0~ds+~cs6.1.1-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-kh5k-ynnf-2bbx
vulnerability_id VCID-kh5k-ynnf-2bbx
summary
Prototype Pollution in Ajv
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15366.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15366.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15366
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.57641
published_at 2026-04-21T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57667
published_at 2026-04-16T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57637
published_at 2026-04-13T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57657
published_at 2026-04-12T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57678
published_at 2026-04-11T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57663
published_at 2026-04-18T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57606
published_at 2026-04-07T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.5763
published_at 2026-04-04T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57609
published_at 2026-04-02T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57659
published_at 2026-04-08T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58193
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15366
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15366
3
reference_url https://github.com/ajv-validator/ajv
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv
4
reference_url https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f
5
reference_url https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv/releases/tag/v6.12.3
6
reference_url https://github.com/ajv-validator/ajv/tags
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ajv-validator/ajv/tags
7
reference_url https://hackerone.com/bugs?subject=user&report_id=894259
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hackerone.com/bugs?subject=user&report_id=894259
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15366
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15366
9
reference_url https://security.netapp.com/advisory/ntap-20240621-0007
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240621-0007
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1857977
reference_id 1857977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1857977
11
reference_url https://github.com/advisories/GHSA-v88g-cgmw-v5xw
reference_id GHSA-v88g-cgmw-v5xw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v88g-cgmw-v5xw
12
reference_url https://access.redhat.com/errata/RHSA-2020:4298
reference_id RHSA-2020:4298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4298
13
reference_url https://access.redhat.com/errata/RHSA-2020:5305
reference_id RHSA-2020:5305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5305
14
reference_url https://access.redhat.com/errata/RHSA-2020:5499
reference_id RHSA-2020:5499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5499
15
reference_url https://access.redhat.com/errata/RHSA-2021:0421
reference_id RHSA-2021:0421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0421
16
reference_url https://access.redhat.com/errata/RHSA-2021:0521
reference_id RHSA-2021:0521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0521
17
reference_url https://access.redhat.com/errata/RHSA-2021:0548
reference_id RHSA-2021:0548
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0548
18
reference_url https://access.redhat.com/errata/RHSA-2021:0551
reference_id RHSA-2021:0551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0551
19
reference_url https://access.redhat.com/errata/RHSA-2021:0781
reference_id RHSA-2021:0781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0781
20
reference_url https://access.redhat.com/errata/RHSA-2021:3917
reference_id RHSA-2021:3917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3917
fixed_packages
0
url pkg:deb/debian/node-ajv@6.12.4-1?distro=trixie
purl pkg:deb/debian/node-ajv@6.12.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ajv@6.12.4-1%3Fdistro=trixie
1
url pkg:deb/debian/node-ajv@6.12.6-2?distro=trixie
purl pkg:deb/debian/node-ajv@6.12.6-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1znw-5dwm-7ydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ajv@6.12.6-2%3Fdistro=trixie
2
url pkg:deb/debian/node-ajv@6.12.6-3?distro=trixie
purl pkg:deb/debian/node-ajv@6.12.6-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1znw-5dwm-7ydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ajv@6.12.6-3%3Fdistro=trixie
3
url pkg:deb/debian/node-ajv@8.12.0~ds%2B~2.1.1-5?distro=trixie
purl pkg:deb/debian/node-ajv@8.12.0~ds%2B~2.1.1-5?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1znw-5dwm-7ydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ajv@8.12.0~ds%252B~2.1.1-5%3Fdistro=trixie
4
url pkg:deb/debian/node-ajv@8.17.1~ds%2B~3.0.1%2B~3.1.0-4?distro=trixie
purl pkg:deb/debian/node-ajv@8.17.1~ds%2B~3.0.1%2B~3.1.0-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1znw-5dwm-7ydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ajv@8.17.1~ds%252B~3.0.1%252B~3.1.0-4%3Fdistro=trixie
5
url pkg:deb/debian/node-ajv@8.18.0~ds%2B~cs6.1.1-1?distro=trixie
purl pkg:deb/debian/node-ajv@8.18.0~ds%2B~cs6.1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ajv@8.18.0~ds%252B~cs6.1.1-1%3Fdistro=trixie
aliases CVE-2020-15366, GHSA-v88g-cgmw-v5xw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kh5k-ynnf-2bbx
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-ajv@6.12.4-1%3Fdistro=trixie