Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u1?distro=trixie
Typedeb
Namespacedebian
Namenode-undici
Version5.15.0+dfsg1+~cs20.10.9.3-1+deb12u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.15.0+dfsg1+~cs20.10.9.3-1+deb12u2
Latest_non_vulnerable_version7.24.6+dfsg+~cs3.2.0-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-dtvs-pgam-qkbp
vulnerability_id VCID-dtvs-pgam-qkbp
summary
CRLF Injection in Nodejs ‘undici’ via host
Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23936.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23936.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23936
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60397
published_at 2026-04-21T12:55:00Z
1
value 0.00536
scoring_system epss
scoring_elements 0.67511
published_at 2026-04-16T12:55:00Z
2
value 0.00536
scoring_system epss
scoring_elements 0.67475
published_at 2026-04-13T12:55:00Z
3
value 0.00536
scoring_system epss
scoring_elements 0.67509
published_at 2026-04-12T12:55:00Z
4
value 0.00536
scoring_system epss
scoring_elements 0.67522
published_at 2026-04-11T12:55:00Z
5
value 0.00536
scoring_system epss
scoring_elements 0.67499
published_at 2026-04-09T12:55:00Z
6
value 0.00536
scoring_system epss
scoring_elements 0.67485
published_at 2026-04-08T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67523
published_at 2026-04-18T12:55:00Z
8
value 0.00602
scoring_system epss
scoring_elements 0.69433
published_at 2026-04-07T12:55:00Z
9
value 0.00727
scoring_system epss
scoring_elements 0.72567
published_at 2026-04-02T12:55:00Z
10
value 0.00727
scoring_system epss
scoring_elements 0.72583
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23936
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://github.com/nodejs/undici/commit/a2eff05401358f6595138df963837c24348f2034
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.19.1
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://github.com/nodejs/undici/releases/tag/v5.19.1
6
reference_url https://hackerone.com/reports/1820955
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://hackerone.com/reports/1820955
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
reference_id 1031418
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2172190
reference_id 2172190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2172190
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-23936
reference_id CVE-2023-23936
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-23936
10
reference_url https://github.com/advisories/GHSA-5r9g-qh6m-jxff
reference_id GHSA-5r9g-qh6m-jxff
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5r9g-qh6m-jxff
11
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff
reference_id GHSA-5r9g-qh6m-jxff
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:01:48Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff
12
reference_url https://access.redhat.com/errata/RHSA-2023:1582
reference_id RHSA-2023:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1582
13
reference_url https://access.redhat.com/errata/RHSA-2023:1583
reference_id RHSA-2023:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1583
14
reference_url https://access.redhat.com/errata/RHSA-2023:2654
reference_id RHSA-2023:2654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2654
15
reference_url https://access.redhat.com/errata/RHSA-2023:2655
reference_id RHSA-2023:2655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2655
16
reference_url https://access.redhat.com/errata/RHSA-2023:5533
reference_id RHSA-2023:5533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5533
fixed_packages
0
url pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-pah5-gspe-hbbh
5
vulnerability VCID-ph2p-u33d-8yh3
6
vulnerability VCID-sy2z-sqgk-d7hg
7
vulnerability VCID-u8t3-4awy-k3fm
8
vulnerability VCID-xx5u-7mmp-akfs
9
vulnerability VCID-z653-vqsc-euer
10
vulnerability VCID-z7ac-jr58-gkfm
11
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u4%3Fdistro=trixie
2
url pkg:deb/debian/node-undici@5.19.1%2Bdfsg1%2B~cs20.10.9.5-1?distro=trixie
purl pkg:deb/debian/node-undici@5.19.1%2Bdfsg1%2B~cs20.10.9.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.19.1%252Bdfsg1%252B~cs20.10.9.5-1%3Fdistro=trixie
3
url pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
purl pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-vdca-exd1-rfce
7
vulnerability VCID-z7ac-jr58-gkfm
8
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.3.0%252Bdfsg1%252B~cs24.12.11-1%3Fdistro=trixie
4
url pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
purl pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-ph2p-u33d-8yh3
4
vulnerability VCID-sy2z-sqgk-d7hg
5
vulnerability VCID-vdca-exd1-rfce
6
vulnerability VCID-z7ac-jr58-gkfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.18.2%252Bdfsg%252B~cs3.2.0-1%3Fdistro=trixie
5
url pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
purl pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.24.6%252Bdfsg%252B~cs3.2.0-2%3Fdistro=trixie
aliases CVE-2023-23936, GHSA-5r9g-qh6m-jxff
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtvs-pgam-qkbp
1
url VCID-vh17-44d1-kyf7
vulnerability_id VCID-vh17-44d1-kyf7
summary
Regular Expression Denial of Service in Headers
Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods is vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24807.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24807
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53759
published_at 2026-04-21T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53777
published_at 2026-04-18T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53772
published_at 2026-04-16T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53735
published_at 2026-04-13T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53751
published_at 2026-04-12T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.5372
published_at 2026-04-09T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53722
published_at 2026-04-08T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53669
published_at 2026-04-07T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53701
published_at 2026-04-04T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.53674
published_at 2026-04-02T12:55:00Z
10
value 0.00305
scoring_system epss
scoring_elements 0.53768
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24807
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/nodejs/undici
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/nodejs/undici
4
reference_url https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://github.com/nodejs/undici/commit/f2324e549943f0b0937b09fb1c0c16cc7c93abdf
5
reference_url https://github.com/nodejs/undici/releases/tag/v5.19.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://github.com/nodejs/undici/releases/tag/v5.19.1
6
reference_url https://hackerone.com/bugs?report_id=1784449
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://hackerone.com/bugs?report_id=1784449
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
reference_id 1031418
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031418
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2172204
reference_id 2172204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2172204
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-24807
reference_id CVE-2023-24807
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-24807
10
reference_url https://github.com/advisories/GHSA-r6ch-mqf9-qc9w
reference_id GHSA-r6ch-mqf9-qc9w
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r6ch-mqf9-qc9w
11
reference_url https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w
reference_id GHSA-r6ch-mqf9-qc9w
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-10T20:58:28Z/
url https://github.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w
12
reference_url https://access.redhat.com/errata/RHSA-2023:1582
reference_id RHSA-2023:1582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1582
13
reference_url https://access.redhat.com/errata/RHSA-2023:1583
reference_id RHSA-2023:1583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1583
14
reference_url https://access.redhat.com/errata/RHSA-2023:2654
reference_id RHSA-2023:2654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2654
15
reference_url https://access.redhat.com/errata/RHSA-2023:2655
reference_id RHSA-2023:2655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2655
16
reference_url https://access.redhat.com/errata/RHSA-2023:5533
reference_id RHSA-2023:5533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5533
fixed_packages
0
url pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-pah5-gspe-hbbh
5
vulnerability VCID-ph2p-u33d-8yh3
6
vulnerability VCID-sy2z-sqgk-d7hg
7
vulnerability VCID-u8t3-4awy-k3fm
8
vulnerability VCID-xx5u-7mmp-akfs
9
vulnerability VCID-z653-vqsc-euer
10
vulnerability VCID-z7ac-jr58-gkfm
11
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u4%3Fdistro=trixie
2
url pkg:deb/debian/node-undici@5.19.1%2Bdfsg1%2B~cs20.10.9.5-1?distro=trixie
purl pkg:deb/debian/node-undici@5.19.1%2Bdfsg1%2B~cs20.10.9.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.19.1%252Bdfsg1%252B~cs20.10.9.5-1%3Fdistro=trixie
3
url pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
purl pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-g9bm-61bn-ryg5
2
vulnerability VCID-hgd1-7u6j-p7dh
3
vulnerability VCID-n6ew-t7g1-33gn
4
vulnerability VCID-ph2p-u33d-8yh3
5
vulnerability VCID-sy2z-sqgk-d7hg
6
vulnerability VCID-vdca-exd1-rfce
7
vulnerability VCID-z7ac-jr58-gkfm
8
vulnerability VCID-zb3h-efqz-dff3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.3.0%252Bdfsg1%252B~cs24.12.11-1%3Fdistro=trixie
4
url pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
purl pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1294-r4v2-3ud7
1
vulnerability VCID-hgd1-7u6j-p7dh
2
vulnerability VCID-n6ew-t7g1-33gn
3
vulnerability VCID-ph2p-u33d-8yh3
4
vulnerability VCID-sy2z-sqgk-d7hg
5
vulnerability VCID-vdca-exd1-rfce
6
vulnerability VCID-z7ac-jr58-gkfm
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.18.2%252Bdfsg%252B~cs3.2.0-1%3Fdistro=trixie
5
url pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
purl pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.24.6%252Bdfsg%252B~cs3.2.0-2%3Fdistro=trixie
aliases CVE-2023-24807, GHSA-r6ch-mqf9-qc9w
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh17-44d1-kyf7
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u1%3Fdistro=trixie