Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-postcss@8.4.5%2B~cs7.1.51-1?distro=trixie
Typedeb
Namespacedebian
Namenode-postcss
Version8.4.5+~cs7.1.51-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version8.4.31+~cs8.0.26-1
Latest_non_vulnerable_version8.5.12+~cs9.3.32-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7cky-3c29-zyar
vulnerability_id VCID-7cky-3c29-zyar
summary
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23566.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23566
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07563
published_at 2026-04-29T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07597
published_at 2026-04-26T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07618
published_at 2026-04-24T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0767
published_at 2026-04-21T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.0753
published_at 2026-04-18T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07541
published_at 2026-04-16T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07616
published_at 2026-04-13T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0763
published_at 2026-04-12T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07436
published_at 2026-04-01T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07551
published_at 2026-04-02T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07644
published_at 2026-04-11T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07627
published_at 2026-04-08T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07593
published_at 2026-04-04T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07568
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23566
3
reference_url https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444
4
reference_url https://github.com/ai/nanoid
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ai/nanoid
5
reference_url https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575
6
reference_url https://github.com/ai/nanoid/pull/328
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/ai/nanoid/pull/328
7
reference_url https://lists.debian.org/debian-lts-announce/2024/12/msg00025.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/12/msg00025.html
8
reference_url https://lists.debian.org/debian-lts-announce/2025/01/msg00006.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2025/01/msg00006.html
9
reference_url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550
10
reference_url https://snyk.io/vuln/SNYK-JS-NANOID-2332193
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-NANOID-2332193
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2050853
reference_id 2050853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2050853
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-23566
reference_id CVE-2021-23566
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-23566
13
reference_url https://github.com/advisories/GHSA-qrpm-p2h7-hrv2
reference_id GHSA-qrpm-p2h7-hrv2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qrpm-p2h7-hrv2
14
reference_url https://access.redhat.com/errata/RHSA-2022:5069
reference_id RHSA-2022:5069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5069
15
reference_url https://access.redhat.com/errata/RHSA-2022:6156
reference_id RHSA-2022:6156
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6156
fixed_packages
0
url pkg:deb/debian/node-postcss@8.2.1%2B~cs5.3.23-8?distro=trixie
purl pkg:deb/debian/node-postcss@8.2.1%2B~cs5.3.23-8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mtj5-ftn7-jye6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.2.1%252B~cs5.3.23-8%3Fdistro=trixie
1
url pkg:deb/debian/node-postcss@8.2.1%2B~cs5.3.23-8%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/node-postcss@8.2.1%2B~cs5.3.23-8%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.2.1%252B~cs5.3.23-8%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/node-postcss@8.4.5%2B~cs7.1.51-1?distro=trixie
purl pkg:deb/debian/node-postcss@8.4.5%2B~cs7.1.51-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.4.5%252B~cs7.1.51-1%3Fdistro=trixie
3
url pkg:deb/debian/node-postcss@8.4.20%2B~cs8.0.23-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/node-postcss@8.4.20%2B~cs8.0.23-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mtj5-ftn7-jye6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.4.20%252B~cs8.0.23-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/node-postcss@8.4.49%2B~cs9.2.32-1?distro=trixie
purl pkg:deb/debian/node-postcss@8.4.49%2B~cs9.2.32-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mtj5-ftn7-jye6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.4.49%252B~cs9.2.32-1%3Fdistro=trixie
5
url pkg:deb/debian/node-postcss@8.5.8%2B~cs9.3.30-1?distro=trixie
purl pkg:deb/debian/node-postcss@8.5.8%2B~cs9.3.30-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.5.8%252B~cs9.3.30-1%3Fdistro=trixie
6
url pkg:deb/debian/node-postcss@8.5.9%2B~cs9.3.30-1?distro=trixie
purl pkg:deb/debian/node-postcss@8.5.9%2B~cs9.3.30-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-mtj5-ftn7-jye6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.5.9%252B~cs9.3.30-1%3Fdistro=trixie
7
url pkg:deb/debian/node-postcss@8.5.12%2B~cs9.3.32-1?distro=trixie
purl pkg:deb/debian/node-postcss@8.5.12%2B~cs9.3.32-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.5.12%252B~cs9.3.32-1%3Fdistro=trixie
aliases CVE-2021-23566, GHSA-qrpm-p2h7-hrv2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cky-3c29-zyar
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-postcss@8.4.5%252B~cs7.1.51-1%3Fdistro=trixie