Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
Typedeb
Namespacedebian
Namenode-got
Version11.8.1+~cs53.13.17-3+deb11u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version11.8.3+~cs58.7.37-3
Latest_non_vulnerable_version11.8.5+~cs58.13.36-6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-vg3f-8mjh-bbf5
vulnerability_id VCID-vg3f-8mjh-bbf5
summary
Got allows a redirect to a UNIX socket
The got package before 11.8.5 and 12.1.0 for Node.js allows a redirect to a UNIX socket.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33987.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33987.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33987
reference_id
reference_type
scores
0
value 0.00807
scoring_system epss
scoring_elements 0.74254
published_at 2026-04-24T12:55:00Z
1
value 0.00807
scoring_system epss
scoring_elements 0.74219
published_at 2026-04-21T12:55:00Z
2
value 0.00807
scoring_system epss
scoring_elements 0.74228
published_at 2026-04-18T12:55:00Z
3
value 0.00807
scoring_system epss
scoring_elements 0.74138
published_at 2026-04-02T12:55:00Z
4
value 0.00807
scoring_system epss
scoring_elements 0.74164
published_at 2026-04-04T12:55:00Z
5
value 0.00807
scoring_system epss
scoring_elements 0.74136
published_at 2026-04-07T12:55:00Z
6
value 0.00807
scoring_system epss
scoring_elements 0.74169
published_at 2026-04-08T12:55:00Z
7
value 0.00807
scoring_system epss
scoring_elements 0.74184
published_at 2026-04-09T12:55:00Z
8
value 0.00807
scoring_system epss
scoring_elements 0.74205
published_at 2026-04-11T12:55:00Z
9
value 0.00807
scoring_system epss
scoring_elements 0.74187
published_at 2026-04-12T12:55:00Z
10
value 0.00807
scoring_system epss
scoring_elements 0.74181
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33987
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987
3
reference_url https://github.com/sindresorhus/got
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/got
4
reference_url https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc
5
reference_url https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
6
reference_url https://github.com/sindresorhus/got/pull/2047
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/got/pull/2047
7
reference_url https://github.com/sindresorhus/got/releases/tag/v11.8.5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/got/releases/tag/v11.8.5
8
reference_url https://github.com/sindresorhus/got/releases/tag/v12.1.0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/got/releases/tag/v12.1.0
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-33987
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-33987
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013264
reference_id 1013264
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013264
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2102001
reference_id 2102001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2102001
12
reference_url https://github.com/advisories/GHSA-pfrx-2q88-qq97
reference_id GHSA-pfrx-2q88-qq97
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pfrx-2q88-qq97
13
reference_url https://access.redhat.com/errata/RHSA-2022:6389
reference_id RHSA-2022:6389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6389
14
reference_url https://access.redhat.com/errata/RHSA-2022:6448
reference_id RHSA-2022:6448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6448
15
reference_url https://access.redhat.com/errata/RHSA-2022:6449
reference_id RHSA-2022:6449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6449
16
reference_url https://access.redhat.com/errata/RHSA-2022:6595
reference_id RHSA-2022:6595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6595
17
reference_url https://access.redhat.com/errata/RHSA-2022:6985
reference_id RHSA-2022:6985
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6985
fixed_packages
0
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/node-got@11.8.3%2B~cs58.7.37-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.3%2B~cs58.7.37-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.3%252B~cs58.7.37-3%3Fdistro=trixie
2
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-3%3Fdistro=trixie
3
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-5%3Fdistro=trixie
4
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-6%3Fdistro=trixie
aliases CVE-2022-33987, GHSA-pfrx-2q88-qq97
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg3f-8mjh-bbf5
1
url VCID-vg7c-pctm-m7gn
vulnerability_id VCID-vg7c-pctm-m7gn
summary
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33502
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-18T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57848
published_at 2026-04-16T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57819
published_at 2026-04-13T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57782
published_at 2026-04-24T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57824
published_at 2026-04-21T12:55:00Z
5
value 0.00464
scoring_system epss
scoring_elements 0.64273
published_at 2026-04-07T12:55:00Z
6
value 0.00464
scoring_system epss
scoring_elements 0.64316
published_at 2026-04-04T12:55:00Z
7
value 0.00464
scoring_system epss
scoring_elements 0.64288
published_at 2026-04-02T12:55:00Z
8
value 0.00464
scoring_system epss
scoring_elements 0.64338
published_at 2026-04-12T12:55:00Z
9
value 0.00464
scoring_system epss
scoring_elements 0.64349
published_at 2026-04-11T12:55:00Z
10
value 0.00464
scoring_system epss
scoring_elements 0.64336
published_at 2026-04-09T12:55:00Z
11
value 0.00464
scoring_system epss
scoring_elements 0.64322
published_at 2026-04-08T12:55:00Z
12
value 0.00464
scoring_system epss
scoring_elements 0.6423
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
3
reference_url https://github.com/sindresorhus/normalize-url
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url
4
reference_url https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
5
reference_url https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-33502
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-33502
7
reference_url https://security.netapp.com/advisory/ntap-20210706-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210706-0001
8
reference_url https://security.netapp.com/advisory/ntap-20210706-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210706-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964461
reference_id 1964461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964461
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989258
reference_id 989258
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989258
11
reference_url https://github.com/advisories/GHSA-px4h-xg32-q955
reference_id GHSA-px4h-xg32-q955
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-px4h-xg32-q955
12
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
13
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
14
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
15
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
16
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
17
reference_url https://access.redhat.com/errata/RHSA-2022:4711
reference_id RHSA-2022:4711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4711
18
reference_url https://access.redhat.com/errata/RHSA-2022:6595
reference_id RHSA-2022:6595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6595
fixed_packages
0
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%3Fdistro=trixie
1
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-3%3Fdistro=trixie
3
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-5%3Fdistro=trixie
4
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-6%3Fdistro=trixie
aliases CVE-2021-33502, GHSA-px4h-xg32-q955
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vg7c-pctm-m7gn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%252Bdeb11u1%3Fdistro=trixie