Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3?distro=trixie
Typedeb
Namespacedebian
Namenode-got
Version11.8.1+~cs53.13.17-3
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version11.8.1+~cs53.13.17-3+deb11u1
Latest_non_vulnerable_version11.8.5+~cs58.13.36-6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-vg7c-pctm-m7gn
vulnerability_id VCID-vg7c-pctm-m7gn
summary
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33502
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-18T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57848
published_at 2026-04-16T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57819
published_at 2026-04-13T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57782
published_at 2026-04-24T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57824
published_at 2026-04-21T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64273
published_at 2026-04-07T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64316
published_at 2026-04-04T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64288
published_at 2026-04-02T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.64338
published_at 2026-04-12T12:55:00Z
9
value 0.00464
scoring_system epss
scoring_elements 0.64349
published_at 2026-04-11T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64336
published_at 2026-04-09T12:55:00Z
11
value 0.00464
scoring_system epss
scoring_elements 0.64322
published_at 2026-04-08T12:55:00Z
12
value 0.00464
scoring_system epss
scoring_elements 0.6423
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
3
reference_url https://github.com/sindresorhus/normalize-url
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url
4
reference_url https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
5
reference_url https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-33502
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-33502
7
reference_url https://security.netapp.com/advisory/ntap-20210706-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210706-0001
8
reference_url https://security.netapp.com/advisory/ntap-20210706-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210706-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964461
reference_id 1964461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964461
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989258
reference_id 989258
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989258
11
reference_url https://github.com/advisories/GHSA-px4h-xg32-q955
reference_id GHSA-px4h-xg32-q955
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-px4h-xg32-q955
12
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
13
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
14
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
15
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
16
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
17
reference_url https://access.redhat.com/errata/RHSA-2022:4711
reference_id RHSA-2022:4711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4711
18
reference_url https://access.redhat.com/errata/RHSA-2022:6595
reference_id RHSA-2022:6595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6595
fixed_packages
0
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%3Fdistro=trixie
1
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-3%3Fdistro=trixie
3
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-5%3Fdistro=trixie
4
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-6%3Fdistro=trixie
aliases CVE-2021-33502, GHSA-px4h-xg32-q955
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg7c-pctm-m7gn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%3Fdistro=trixie