Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/932824?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/932824?format=api", "purl": "pkg:deb/debian/nodejs@12.22.7~dfsg-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "nodejs", "version": "12.22.7~dfsg-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "12.22.9~dfsg-1", "latest_non_vulnerable_version": "22.22.2+dfsg+~cs22.19.15-3", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11561?format=api", "vulnerability_id": "VCID-gwyr-ac4e-dqfa", "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')\nThe llhttp parser accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22959.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22959.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43783", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43715", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43706", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43779", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43746", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43791", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1238709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hackerone.com/reports/1238709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", "reference_id": "2014057", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014057" }, { "reference_url": "https://security.archlinux.org/ASA-202110-4", "reference_id": "ASA-202110-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202110-4" }, { "reference_url": "https://security.archlinux.org/AVG-2460", "reference_id": "AVG-2460", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2460" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", "reference_id": "CVE-2021-22959", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22959" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5171", "reference_id": "RHSA-2021:5171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0041", "reference_id": "RHSA-2022:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0246", "reference_id": "RHSA-2022:0246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0350", "reference_id": "RHSA-2022:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/932824?format=api", "purl": "pkg:deb/debian/nodejs@12.22.7~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.7~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932825?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932797?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-x1an-pjq4-nbby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932795?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932799?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932798?format=api", "purl": "pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@22.22.2%252Bdfsg%252B~cs22.19.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1063054?format=api", "purl": "pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@22.22.2%252Bdfsg%252B~cs22.19.15-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-22959" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwyr-ac4e-dqfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11473?format=api", "vulnerability_id": "VCID-tnhd-rr89-9udh", "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')\nThe parse function in llhttp ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45651", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45729", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45677", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45733", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45751", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45779", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1238099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hackerone.com/reports/1238099" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", "reference_id": "2014059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014059" }, { "reference_url": "https://security.archlinux.org/ASA-202110-4", "reference_id": "ASA-202110-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202110-4" }, { "reference_url": "https://security.archlinux.org/AVG-2460", "reference_id": "AVG-2460", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2460" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", "reference_id": "CVE-2021-22960", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22960" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5171", "reference_id": "RHSA-2021:5171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0041", "reference_id": "RHSA-2022:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0246", "reference_id": "RHSA-2022:0246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0350", "reference_id": "RHSA-2022:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/932824?format=api", "purl": "pkg:deb/debian/nodejs@12.22.7~dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.7~dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932825?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932797?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-x1an-pjq4-nbby" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932795?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932799?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/932798?format=api", "purl": "pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@22.22.2%252Bdfsg%252B~cs22.19.15-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1063054?format=api", "purl": "pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@22.22.2%252Bdfsg%252B~cs22.19.15-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-22960" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tnhd-rr89-9udh" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.7~dfsg-1%3Fdistro=trixie" }