Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/994760?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "type": "deb", "namespace": "debian", "name": "nodejs", "version": "12.22.12~dfsg-1~deb11u4", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "20.19.2+dfsg-1", "latest_non_vulnerable_version": "20.19.2+dfsg-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63920?format=api", "vulnerability_id": "VCID-1vp3-fzdr-yqbm", "summary": "Node.js: Node.js: Information disclosure due to `fs.realpathSync.native()` bypassing filesystem read restrictions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21715.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21715.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21715", "reference_id": "", "reference_type": "", "scores": [ { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00177", "published_at": "2026-04-04T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00201", "published_at": "2026-04-08T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.002", "published_at": "2026-04-09T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00202", "published_at": "2026-04-13T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00204", "published_at": "2026-04-16T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00205", "published_at": "2026-04-29T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00208", "published_at": "2026-04-24T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00207", "published_at": "2026-04-26T12:55:00Z" }, { "value": "5e-05", "scoring_system": "epss", "scoring_elements": "0.00216", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21715" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152", "reference_id": "2453152", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670", "reference_id": "RHSA-2026:7670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2026-21715" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vp3-fzdr-yqbm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63923?format=api", "vulnerability_id": "VCID-2t7c-dju9-pff6", "summary": "Node.js: Node.js: Information disclosure via timing oracle in HMAC verification", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21713.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21713.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.0144", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05575", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05638", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05602", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05595", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0556", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07607", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07629", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07571", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07681", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21713" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160", "reference_id": "2453160", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453160" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases", "reference_id": "march-2026-security-releases", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T19:45:13Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670", "reference_id": "RHSA-2026:7670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2026-21713" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2t7c-dju9-pff6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37577?format=api", "vulnerability_id": "VCID-2z1f-7jkw-17av", "summary": "Multiple vulnerabilities have been discovered in Node.js, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27982.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60121", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60161", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60147", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60117", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60133", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60068", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60093", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60113", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60127", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60149", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60134", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00391", "scoring_system": "epss", "scoring_elements": "0.60116", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27982" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068347", "reference_id": "1068347", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068347" }, { "reference_url": "https://hackerone.com/reports/2237099", "reference_id": "2237099", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-07T18:19:19Z/" } ], "url": "https://hackerone.com/reports/2237099" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392", "reference_id": "2275392", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275392" }, { "reference_url": "https://security.archlinux.org/AVG-2852", "reference_id": "AVG-2852", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2852" }, { "reference_url": "https://security.archlinux.org/AVG-2853", "reference_id": "AVG-2853", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2853" }, { "reference_url": "https://security.gentoo.org/glsa/202505-11", "reference_id": "GLSA-202505-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2778", "reference_id": "RHSA-2024:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2779", "reference_id": "RHSA-2024:2779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2780", "reference_id": "RHSA-2024:2780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2853", "reference_id": "RHSA-2024:2853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2910", "reference_id": "RHSA-2024:2910", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2910" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3545", "reference_id": "RHSA-2024:3545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4559", "reference_id": "RHSA-2024:4559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4559" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2024-27982" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2z1f-7jkw-17av" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62481?format=api", "vulnerability_id": "VCID-38k9-23j3-eqh7", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30581.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04633", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04877", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04791", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04825", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04864", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04657", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.0467", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04704", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04716", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04709", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04643", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00018", "scoring_system": "epss", "scoring_elements": "0.04651", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039990", "reference_id": "1039990", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039990" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824", "reference_id": "2219824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases", "reference_id": "june-2023-security-releases", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-05T14:18:07Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/june-2023-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4330", "reference_id": "RHSA-2023:4330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4331", "reference_id": "RHSA-2023:4331", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4536", "reference_id": "RHSA-2023:4536", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4536" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4537", "reference_id": "RHSA-2023:4537", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5361", "reference_id": "RHSA-2023:5361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5533", "reference_id": "RHSA-2023:5533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5533" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2023-30581" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38k9-23j3-eqh7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64946?format=api", "vulnerability_id": "VCID-43sf-4r41-wugc", "summary": "nodejs: Nodejs filesystem permissions bypass", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55132.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55132.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55132", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01084", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01149", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01068", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01142", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01085", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.0108", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01073", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0001", "scoring_system": "epss", "scoring_elements": "0.01075", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338", "reference_id": "2431338", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431338" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases", "reference_id": "december-2025-security-releases", "reference_type": "", "scores": [ { "value": "2.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T18:38:44Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1842", "reference_id": "RHSA-2026:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1843", "reference_id": "RHSA-2026:1843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2420", "reference_id": "RHSA-2026:2420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2421", "reference_id": "RHSA-2026:2421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2422", "reference_id": "RHSA-2026:2422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2781", "reference_id": "RHSA-2026:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2782", "reference_id": "RHSA-2026:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2783", "reference_id": "RHSA-2026:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7378", "reference_id": "RHSA-2026:7378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7657", "reference_id": "RHSA-2026:7657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7657" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2025-55132" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43sf-4r41-wugc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63924?format=api", "vulnerability_id": "VCID-96yh-1wub-zucg", "summary": "Node.js: Node.js: Memory leak and Denial of Service via crafted HTTP/2 WINDOW_UPDATE frames", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21714.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21714.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21714", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02682", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0377", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03392", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03372", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03344", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03718", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03722", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03725", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21714" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21714", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21714" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161", "reference_id": "2453161", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453161" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases", "reference_id": "march-2026-security-releases", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T16:14:45Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670", "reference_id": "RHSA-2026:7670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2026-21714" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96yh-1wub-zucg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64952?format=api", "vulnerability_id": "VCID-98fy-tedc-ube7", "summary": "nodejs: Nodejs uninitialized memory exposure", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55131.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55131.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55131", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09833", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09836", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09865", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09911", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09877", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09884", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09855", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09913", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09876", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09861", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09715", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55131" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350", "reference_id": "2431350", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431350" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases", "reference_id": "december-2025-security-releases", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:31Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1842", "reference_id": "RHSA-2026:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1843", "reference_id": "RHSA-2026:1843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2420", "reference_id": "RHSA-2026:2420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2421", "reference_id": "RHSA-2026:2421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2422", "reference_id": "RHSA-2026:2422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2767", "reference_id": "RHSA-2026:2767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2768", "reference_id": "RHSA-2026:2768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2781", "reference_id": "RHSA-2026:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2782", "reference_id": "RHSA-2026:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2783", "reference_id": "RHSA-2026:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2864", "reference_id": "RHSA-2026:2864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2864" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2899", "reference_id": "RHSA-2026:2899", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7378", "reference_id": "RHSA-2026:7378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7657", "reference_id": "RHSA-2026:7657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7657" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2025-55131" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98fy-tedc-ube7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62495?format=api", "vulnerability_id": "VCID-9yq7-aba3-c7c3", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32559.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18728", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18926", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1888", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18892", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18904", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18793", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18772", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18963", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19024", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18977", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22427", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050739", "reference_id": "1050739", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050739" }, { "reference_url": "https://hackerone.com/reports/1946470", "reference_id": "1946470", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:34:58Z/" } ], "url": "https://hackerone.com/reports/1946470" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956", "reference_id": "2230956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0006/", "reference_id": "ntap-20231006-0006", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:34:58Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231006-0006/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5360", "reference_id": "RHSA-2023:5360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5361", "reference_id": "RHSA-2023:5361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5362", "reference_id": "RHSA-2023:5362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5363", "reference_id": "RHSA-2023:5363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5532", "reference_id": "RHSA-2023:5532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5533", "reference_id": "RHSA-2023:5533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5533" }, { "reference_url": "https://usn.ubuntu.com/6822-1/", "reference_id": "USN-6822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6822-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2023-32559" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yq7-aba3-c7c3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64947?format=api", "vulnerability_id": "VCID-bjza-25hu-vkad", "summary": "nodejs: Nodejs denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21637.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21637.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21637", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13426", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13564", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13535", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13633", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13684", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13654", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13618", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1348", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340", "reference_id": "2431340", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431340" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases", "reference_id": "december-2025-security-releases", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:22:28Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1842", "reference_id": "RHSA-2026:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1843", "reference_id": "RHSA-2026:1843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2420", "reference_id": "RHSA-2026:2420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2421", "reference_id": "RHSA-2026:2421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2422", "reference_id": "RHSA-2026:2422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2767", "reference_id": "RHSA-2026:2767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2768", "reference_id": "RHSA-2026:2768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2781", "reference_id": "RHSA-2026:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2782", "reference_id": "RHSA-2026:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2783", "reference_id": "RHSA-2026:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2864", "reference_id": "RHSA-2026:2864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2864" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2899", "reference_id": "RHSA-2026:2899", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670", "reference_id": "RHSA-2026:7670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2026-21637" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjza-25hu-vkad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37572?format=api", "vulnerability_id": "VCID-bx67-aud6-b3fa", "summary": "Multiple vulnerabilities have been discovered in Node.js, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22025.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22025.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22025", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62483", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62515", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70504", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70415", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70457", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70465", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70445", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70496", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70505", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70359", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.7042", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70444", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00636", "scoring_system": "epss", "scoring_elements": "0.70429", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22025" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559", "reference_id": "2270559", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270559" }, { "reference_url": "https://hackerone.com/reports/2284065", "reference_id": "2284065", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T20:30:35Z/" } ], "url": "https://hackerone.com/reports/2284065" }, { "reference_url": "https://security.gentoo.org/glsa/202505-11", "reference_id": "GLSA-202505-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-11" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T20:30:35Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00029.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240517-0008/", "reference_id": "ntap-20240517-0008", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-21T20:30:35Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240517-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2778", "reference_id": "RHSA-2024:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2779", "reference_id": "RHSA-2024:2779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2780", "reference_id": "RHSA-2024:2780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2853", "reference_id": "RHSA-2024:2853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2910", "reference_id": "RHSA-2024:2910", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2910" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4559", "reference_id": "RHSA-2024:4559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4721", "reference_id": "RHSA-2024:4721", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4721" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2024-22025" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bx67-aud6-b3fa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69900?format=api", "vulnerability_id": "VCID-c8xz-v6h3-6ueb", "summary": "nodejs: libuv: Out-of-Bounds Access Due to Inconsistent off_t Size in libuv and Node.js Build on i386", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47153.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47153.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47153", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71897", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71829", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71837", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71861", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71866", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71849", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71894", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71899", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71805", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71779", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00692", "scoring_system": "epss", "scoring_elements": "0.71818", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-47153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47153" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363236", "reference_id": "2363236", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2363236" }, { "reference_url": "https://github.com/nodejs/node-v0.x-archive/issues/4549", "reference_id": "4549", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-01T14:42:34Z/" } ], "url": "https://github.com/nodejs/node-v0.x-archive/issues/4549" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076350", "reference_id": "bugreport.cgi?bug=1076350", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-01T14:42:34Z/" } ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076350" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922075", "reference_id": "bugreport.cgi?bug=922075", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-01T14:42:34Z/" } ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922075" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=892601", "reference_id": "show_bug.cgi?id=892601", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-01T14:42:34Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892601" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2025-47153" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c8xz-v6h3-6ueb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63925?format=api", "vulnerability_id": "VCID-dgkh-jdah-wfh9", "summary": "nodejs: v8: Node.js: Denial of Service via V8 string hashing mechanism due to predictable hash collisions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21717.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21717.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21717", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05391", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07429", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07425", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07414", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07343", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07331", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10135", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10156", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10078", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10176", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21717" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21717" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162", "reference_id": "2453162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453162" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases", "reference_id": "march-2026-security-releases", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-30T19:46:02Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670", "reference_id": "RHSA-2026:7670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2026-21717" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgkh-jdah-wfh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63919?format=api", "vulnerability_id": "VCID-dt7u-3usg-9uet", "summary": "Node.js: Node.js: Denial of Service due to crafted HTTP `__proto__` header", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21710.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21710.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21710", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0252", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.03788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05801", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05826", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05797", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05755", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05763", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08043", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08078", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08015", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.08124", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21710" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21710" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151", "reference_id": "2453151", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453151" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases", "reference_id": "march-2026-security-releases", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:55:20Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7080", "reference_id": "RHSA-2026:7080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7123", "reference_id": "RHSA-2026:7123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7123" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7302", "reference_id": "RHSA-2026:7302", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7302" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7310", "reference_id": "RHSA-2026:7310", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7310" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670", "reference_id": "RHSA-2026:7670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7896", "reference_id": "RHSA-2026:7896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7896" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7983", "reference_id": "RHSA-2026:7983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8339", "reference_id": "RHSA-2026:8339", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8339" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9711", "reference_id": "RHSA-2026:9711", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9711" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9874", "reference_id": "RHSA-2026:9874", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9874" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2026-21710" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dt7u-3usg-9uet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37546?format=api", "vulnerability_id": "VCID-e6gj-fe31-kkh5", "summary": "Multiple vulnerabilities have been discovered in Node.js, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46809.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46809.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79194", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79316", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79257", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79292", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79298", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79218", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79203", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79236", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.7926", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79244", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79232", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01239", "scoring_system": "epss", "scoring_elements": "0.79256", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46809" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064055", "reference_id": "1064055", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064055" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264569", "reference_id": "2264569", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264569" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases", "reference_id": "february-2024-security-releases", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-09T17:40:41Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases" }, { "reference_url": "https://security.gentoo.org/glsa/202505-11", "reference_id": "GLSA-202505-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1503", "reference_id": "RHSA-2024:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1510", "reference_id": "RHSA-2024:1510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1687", "reference_id": "RHSA-2024:1687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1688", "reference_id": "RHSA-2024:1688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1880", "reference_id": "RHSA-2024:1880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1932", "reference_id": "RHSA-2024:1932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1932" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2023-46809" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6gj-fe31-kkh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62488?format=api", "vulnerability_id": "VCID-e7u5-356v-jbg7", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30590.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30590.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30590", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76361", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76391", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76373", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76405", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.7642", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76445", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76459", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76463", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76449", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76483", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76489", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00954", "scoring_system": "epss", "scoring_elements": "0.76502", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30590" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039990", "reference_id": "1039990", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039990" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842", "reference_id": "2219842", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4330", "reference_id": "RHSA-2023:4330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4331", "reference_id": "RHSA-2023:4331", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4536", "reference_id": "RHSA-2023:4536", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4536" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4537", "reference_id": "RHSA-2023:4537", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5361", "reference_id": "RHSA-2023:5361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5533", "reference_id": "RHSA-2023:5533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5533" }, { "reference_url": "https://usn.ubuntu.com/6735-1/", "reference_id": "USN-6735-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6735-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2023-30590" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7u5-356v-jbg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62493?format=api", "vulnerability_id": "VCID-kj75-vmwa-gqgq", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32006.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32006.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32006", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22114", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22405", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22426", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22385", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22343", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22287", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22137", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22125", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22479", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22267", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2235", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050739", "reference_id": "1050739", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050739" }, { "reference_url": "https://hackerone.com/reports/2043807", "reference_id": "2043807", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:20:48Z/" } ], "url": "https://hackerone.com/reports/2043807" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955", "reference_id": "2230955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/", "reference_id": "JQPELKG2LVTADSB7ME73AV4DXQK47PWK", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:20:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JQPELKG2LVTADSB7ME73AV4DXQK47PWK/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230915-0009/", "reference_id": "ntap-20230915-0009", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:20:48Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230915-0009/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/", "reference_id": "PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:20:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBOZE2QZIBLFFTYWYN23FGKN6HULZ6HX/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5360", "reference_id": "RHSA-2023:5360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5361", "reference_id": "RHSA-2023:5361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5362", "reference_id": "RHSA-2023:5362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5363", "reference_id": "RHSA-2023:5363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5532", "reference_id": "RHSA-2023:5532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5533", "reference_id": "RHSA-2023:5533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5533" }, { "reference_url": "https://usn.ubuntu.com/6822-1/", "reference_id": "USN-6822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6822-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2023-32006" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kj75-vmwa-gqgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37580?format=api", "vulnerability_id": "VCID-nenk-4cgd-fugv", "summary": "Multiple vulnerabilities have been discovered in Node.js, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27983.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27983.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27983", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98927", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98907", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98911", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98914", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98915", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98917", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98919", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98922", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.75933", "scoring_system": "epss", "scoring_elements": "0.98926", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27983" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068347", "reference_id": "1068347", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068347" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764", "reference_id": "2272764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272764" }, { "reference_url": "https://hackerone.com/reports/2319584", "reference_id": "2319584", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/" } ], "url": "https://hackerone.com/reports/2319584" }, { "reference_url": "https://security.archlinux.org/AVG-2852", "reference_id": "AVG-2852", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2852" }, { "reference_url": "https://security.archlinux.org/AVG-2853", "reference_id": "AVG-2853", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2853" }, { "reference_url": "https://security.gentoo.org/glsa/202505-11", "reference_id": "GLSA-202505-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-11" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/", "reference_id": "JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDECX4BYZLMM4S4LALN4DPZ2HUTTPLKE/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240510-0002/", "reference_id": "ntap-20240510-0002", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240510-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2778", "reference_id": "RHSA-2024:2778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2778" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2779", "reference_id": "RHSA-2024:2779", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2780", "reference_id": "RHSA-2024:2780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2853", "reference_id": "RHSA-2024:2853", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2853" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2910", "reference_id": "RHSA-2024:2910", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2910" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2937", "reference_id": "RHSA-2024:2937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3472", "reference_id": "RHSA-2024:3472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3544", "reference_id": "RHSA-2024:3544", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3544" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3545", "reference_id": "RHSA-2024:3545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3553", "reference_id": "RHSA-2024:3553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4353", "reference_id": "RHSA-2024:4353", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4353" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4824", "reference_id": "RHSA-2024:4824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4824" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/", "reference_id": "YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-09T19:14:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDVFUH7ACZPYB3BS4SVILNOY7NQU73VW/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2024-27983" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nenk-4cgd-fugv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62489?format=api", "vulnerability_id": "VCID-sag8-repb-g3f4", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32002.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12177", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12184", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12148", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11987", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12102", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12243", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17288", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17204", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17265", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-32002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050739", "reference_id": "1050739", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050739" }, { "reference_url": "https://hackerone.com/reports/1960870", "reference_id": "1960870", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-07-02T14:47:51Z/" } ], "url": "https://hackerone.com/reports/1960870" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948", "reference_id": "2230948", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230915-0009/", "reference_id": "ntap-20230915-0009", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-07-02T14:47:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230915-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5360", "reference_id": "RHSA-2023:5360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5361", "reference_id": "RHSA-2023:5361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5362", "reference_id": "RHSA-2023:5362", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5362" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5363", "reference_id": "RHSA-2023:5363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5532", "reference_id": "RHSA-2023:5532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5533", "reference_id": "RHSA-2023:5533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5533" }, { "reference_url": "https://usn.ubuntu.com/6822-1/", "reference_id": "USN-6822-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6822-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2023-32002" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sag8-repb-g3f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63921?format=api", "vulnerability_id": "VCID-twc8-ewm7-wkb1", "summary": "nodejs: Node.js: Permission bypass allows unauthorized modification of file permissions and ownership via incomplete security fix.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21716.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21716.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21716", "reference_id": "", "reference_type": "", "scores": [ { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00202", "published_at": "2026-04-26T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00198", "published_at": "2026-04-13T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00199", "published_at": "2026-04-29T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00201", "published_at": "2026-04-21T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "4e-05", "scoring_system": "epss", "scoring_elements": "0.00196", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-21716" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21716", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21716" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157", "reference_id": "2453157", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453157" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases", "reference_id": "march-2026-security-releases", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-31T14:27:06Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/march-2026-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7350", "reference_id": "RHSA-2026:7350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7670", "reference_id": "RHSA-2026:7670", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7670" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7675", "reference_id": "RHSA-2026:7675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7675" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2026-21716" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twc8-ewm7-wkb1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64949?format=api", "vulnerability_id": "VCID-u8bq-8jp4-jkem", "summary": "nodejs: Nodejs denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59466.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59466.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0809", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08064", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08171", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08127", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08091", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08146", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08168", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0814", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08123", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08015", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343", "reference_id": "2431343", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431343" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases", "reference_id": "december-2025-security-releases", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T18:38:35Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1842", "reference_id": "RHSA-2026:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1843", "reference_id": "RHSA-2026:1843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2420", "reference_id": "RHSA-2026:2420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2421", "reference_id": "RHSA-2026:2421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2422", "reference_id": "RHSA-2026:2422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2767", "reference_id": "RHSA-2026:2767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2768", "reference_id": "RHSA-2026:2768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2781", "reference_id": "RHSA-2026:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2782", "reference_id": "RHSA-2026:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2783", "reference_id": "RHSA-2026:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2864", "reference_id": "RHSA-2026:2864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2864" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2899", "reference_id": "RHSA-2026:2899", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2025-59466" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8bq-8jp4-jkem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64951?format=api", "vulnerability_id": "VCID-v7uy-445x-tuan", "summary": "nodejs: Nodejs denial of service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59465.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-59465.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59465", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2265", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22825", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22661", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22654", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.23014", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22805", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22879", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22931", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2295", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22913", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22871", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22865", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-59465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349", "reference_id": "2431349", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431349" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases", "reference_id": "december-2025-security-releases", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T20:10:32Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1842", "reference_id": "RHSA-2026:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1843", "reference_id": "RHSA-2026:1843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2420", "reference_id": "RHSA-2026:2420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2421", "reference_id": "RHSA-2026:2421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2422", "reference_id": "RHSA-2026:2422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2767", "reference_id": "RHSA-2026:2767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2768", "reference_id": "RHSA-2026:2768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2781", "reference_id": "RHSA-2026:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2782", "reference_id": "RHSA-2026:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2783", "reference_id": "RHSA-2026:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2864", "reference_id": "RHSA-2026:2864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2864" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2899", "reference_id": "RHSA-2026:2899", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2025-59465" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v7uy-445x-tuan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37562?format=api", "vulnerability_id": "VCID-vkvx-gxbu-3uau", "summary": "Multiple vulnerabilities have been discovered in Node.js, the worst of which could lead to execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22019.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22019.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22019", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59492", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59525", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59509", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.5949", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59524", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59529", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59513", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59485", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.5945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59475", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59442", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59493", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59506", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-22019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22019" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064055", "reference_id": "1064055", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1064055" }, { "reference_url": "https://hackerone.com/reports/2233486", "reference_id": "2233486", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:15:49Z/" } ], "url": "https://hackerone.com/reports/2233486" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264574", "reference_id": "2264574", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264574" }, { "reference_url": "https://security.gentoo.org/glsa/202505-11", "reference_id": "GLSA-202505-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-11" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240315-0004/", "reference_id": "ntap-20240315-0004", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-07T21:15:49Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240315-0004/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1354", "reference_id": "RHSA-2024:1354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1424", "reference_id": "RHSA-2024:1424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1438", "reference_id": "RHSA-2024:1438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1444", "reference_id": "RHSA-2024:1444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1503", "reference_id": "RHSA-2024:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1510", "reference_id": "RHSA-2024:1510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1678", "reference_id": "RHSA-2024:1678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1687", "reference_id": "RHSA-2024:1687", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1687" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1688", "reference_id": "RHSA-2024:1688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1880", "reference_id": "RHSA-2024:1880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1932", "reference_id": "RHSA-2024:1932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2651", "reference_id": "RHSA-2024:2651", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2651" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2793", "reference_id": "RHSA-2024:2793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2793" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2024-22019" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vkvx-gxbu-3uau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31261?format=api", "vulnerability_id": "VCID-wf5t-3pwz-c7d7", "summary": "Multiple vulnerabilities have been discovered in Node.js, the worst of which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23085.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-23085.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-23085", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37039", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37451", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37433", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37158", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37127", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.3744", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37452", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37466", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37431", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38175", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38068", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-23085" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23085" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094134", "reference_id": "1094134", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094134" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342618", "reference_id": "2342618", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342618" }, { "reference_url": "https://security.gentoo.org/glsa/202506-08", "reference_id": "GLSA-202506-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202506-08" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases", "reference_id": "january-2025-security-releases", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-07T15:50:24Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/january-2025-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1351", "reference_id": "RHSA-2025:1351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1443", "reference_id": "RHSA-2025:1443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1446", "reference_id": "RHSA-2025:1446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1582", "reference_id": "RHSA-2025:1582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1582" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1611", "reference_id": "RHSA-2025:1611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1611" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1613", "reference_id": "RHSA-2025:1613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1613" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2025-23085" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wf5t-3pwz-c7d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64953?format=api", "vulnerability_id": "VCID-x1an-pjq4-nbby", "summary": "nodejs: Nodejs file permissions bypass", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-55130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02953", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03065", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03034", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03031", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03021", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02976", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03002", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02964", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02916", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-55130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352", "reference_id": "2431352", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431352" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases", "reference_id": "december-2025-security-releases", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-22T04:55:29Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/december-2025-security-releases" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1842", "reference_id": "RHSA-2026:1842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1843", "reference_id": "RHSA-2026:1843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2420", "reference_id": "RHSA-2026:2420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2421", "reference_id": "RHSA-2026:2421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2422", "reference_id": "RHSA-2026:2422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2767", "reference_id": "RHSA-2026:2767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2768", "reference_id": "RHSA-2026:2768", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2781", "reference_id": "RHSA-2026:2781", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2782", "reference_id": "RHSA-2026:2782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2783", "reference_id": "RHSA-2026:2783", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2864", "reference_id": "RHSA-2026:2864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2864" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2899", "reference_id": "RHSA-2026:2899", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6402", "reference_id": "RHSA-2026:6402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:6431", "reference_id": "RHSA-2026:6431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:6431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7378", "reference_id": "RHSA-2026:7378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7386", "reference_id": "RHSA-2026:7386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7387", "reference_id": "RHSA-2026:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:7657", "reference_id": "RHSA-2026:7657", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:7657" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994766?format=api", "purl": "pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1" } ], "aliases": [ "CVE-2025-55130" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x1an-pjq4-nbby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18167?format=api", "vulnerability_id": "VCID-zstw-3wmu-u3c8", "summary": "llhttp vulnerable to HTTP request smuggling\nThe llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).\n\nThe CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30589.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-30589.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30589", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83384", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83382", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83349", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83348", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83313", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83323", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83275", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83276", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83261", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83375", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01916", "scoring_system": "epss", "scoring_elements": "0.83351", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-30589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30589", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30589" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/nodejs/llhttp", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/nodejs/llhttp" }, { "reference_url": "https://github.com/nodejs/llhttp/releases/tag/release%2Fv8.1.1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/nodejs/llhttp/releases/tag/release%2Fv8.1.1" }, { "reference_url": "https://hackerone.com/reports/2001873", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://hackerone.com/reports/2001873" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00029.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMEELCREWMRT6NS7HWXLA6XFLLMO36HE" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IV326O2X4BE3SINX5FJHMAKVHUAA4ZYF" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UEJWL67XR67JAGEL2ZK22NA3BRKNMZNY" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCVG4TQRGTK4LKAZKVEQAUEJM7DUACYE" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEEQIN5242K5NBE2CZ4DYTNA5B4YTYE5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKFMKD4MJZIKFQJAAJ4VZ2FHIJ764A76" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230803-0009", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20230803-0009" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039990", "reference_id": "1039990", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039990" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841", "reference_id": "2219841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589", "reference_id": "CVE-2023-30589", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589" }, { "reference_url": "https://github.com/advisories/GHSA-cggh-pq45-6h9x", "reference_id": "GHSA-cggh-pq45-6h9x", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-cggh-pq45-6h9x" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4330", "reference_id": "RHSA-2023:4330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4331", "reference_id": "RHSA-2023:4331", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4536", "reference_id": "RHSA-2023:4536", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4536" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4537", "reference_id": "RHSA-2023:4537", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5361", "reference_id": "RHSA-2023:5361", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5533", "reference_id": "RHSA-2023:5533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5533" }, { "reference_url": "https://usn.ubuntu.com/6735-1/", "reference_id": "USN-6735-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6735-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994761?format=api", "purl": "pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-xkpz-pb5y-jqcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1" } ], "aliases": [ "CVE-2023-30589", "GHSA-cggh-pq45-6h9x" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zstw-3wmu-u3c8" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34821?format=api", "vulnerability_id": "VCID-53xm-8w84-93cx", "summary": "Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22930.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22930.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22930", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55216", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55292", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55299", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55319", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55315", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55339", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55321", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55371", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55382", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55361", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55342", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55378", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00323", "scoring_system": "epss", "scoring_elements": "0.55383", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22930" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394", "reference_id": "1988394", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1988394" }, { "reference_url": "https://security.archlinux.org/ASA-202108-1", "reference_id": "ASA-202108-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202108-1" }, { "reference_url": "https://security.archlinux.org/AVG-2239", "reference_id": "AVG-2239", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2239" }, { "reference_url": "https://security.gentoo.org/glsa/202401-02", "reference_id": "GLSA-202401-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202401-02" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280", "reference_id": "RHSA-2021:3280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281", "reference_id": "RHSA-2021:3281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623", "reference_id": "RHSA-2021:3623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638", "reference_id": "RHSA-2021:3638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639", "reference_id": "RHSA-2021:3639", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666", "reference_id": "RHSA-2021:3666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-22930" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53xm-8w84-93cx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13058?format=api", "vulnerability_id": "VCID-5cf7-va9h-h3gy", "summary": "Improper Certificate Validation\nAccepting arbitrary Subject Alternative Name (SAN) types, unless a PKI is specifically defined to use a particular SAN type, can result in bypassing name-constrained intermediates. Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 was accepting URI SAN types, which PKIs are often not defined to use. Additionally, when a protocol allows URI SANs, Node.js does not match the URI correctly.Versions of Node.js with the fix for this disable the URI SAN type when checking a certificate against a hostname. This behavior can be reverted through the --security-revert command-line option.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44531.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22783", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22952", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22789", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22863", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22916", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22843", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22856", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22851", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2281", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2264", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22635", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1429694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hackerone.com/reports/1429694" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220325-0007/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2022/dsa-5170" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177", "reference_id": "1004177", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040839", "reference_id": "2040839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040839" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44531", "reference_id": "CVE-2021-44531", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44531" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7044", "reference_id": "RHSA-2022:7044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7830", "reference_id": "RHSA-2022:7830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9073", "reference_id": "RHSA-2022:9073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1742", "reference_id": "RHSA-2023:1742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3742", "reference_id": "RHSA-2023:3742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3742" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-44531" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cf7-va9h-h3gy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62475?format=api", "vulnerability_id": "VCID-7tpb-9zrz-e7e1", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32212.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32212.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19983", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20041", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19768", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19848", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19901", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19911", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19782", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19785", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19798", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19692", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19685", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19651", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105422", "reference_id": "2105422", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105422" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6389", "reference_id": "RHSA-2022:6389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6448", "reference_id": "RHSA-2022:6448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6449", "reference_id": "RHSA-2022:6449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6595", "reference_id": "RHSA-2022:6595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6985", "reference_id": "RHSA-2022:6985", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6985" }, { "reference_url": "https://usn.ubuntu.com/6491-1/", "reference_id": "USN-6491-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6491-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-32212" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7tpb-9zrz-e7e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53859?format=api", "vulnerability_id": "VCID-8c4g-fjsa-nkhw", "summary": "llhttp allows HTTP Request Smuggling via Improper Delimiting of Header Fields\nThe llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. The LF character (without CR) is sufficient to delimit HTTP header fields in the lihttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This can lead to HTTP Request Smuggling (HRS).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.39294", "scoring_system": "epss", "scoring_elements": "0.97303", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.39294", "scoring_system": "epss", "scoring_elements": "0.97301", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.39294", "scoring_system": "epss", "scoring_elements": "0.973", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.39294", "scoring_system": "epss", "scoring_elements": "0.97298", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.39294", "scoring_system": "epss", "scoring_elements": "0.97296", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97608", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97612", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97611", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97624", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97622", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.45841", "scoring_system": "epss", "scoring_elements": "0.97619", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" }, { "reference_url": "https://datatracker.ietf.org/doc/html/rfc7230#section-3", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://datatracker.ietf.org/doc/html/rfc7230#section-3" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb" }, { "reference_url": "https://hackerone.com/reports/1524692", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://hackerone.com/reports/1524692" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32214" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220915-0001" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220915-0001/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5326", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2023/dsa-5326" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105428", "reference_id": "2105428", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105428" }, { "reference_url": "https://github.com/advisories/GHSA-q5vx-44v4-gch4", "reference_id": "GHSA-q5vx-44v4-gch4", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-q5vx-44v4-gch4" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6389", "reference_id": "RHSA-2022:6389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6448", "reference_id": "RHSA-2022:6448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6449", "reference_id": "RHSA-2022:6449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6595", "reference_id": "RHSA-2022:6595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6985", "reference_id": "RHSA-2022:6985", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6985" }, { "reference_url": "https://usn.ubuntu.com/6491-1/", "reference_id": "USN-6491-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6491-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-32214", "GHSA-q5vx-44v4-gch4" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8c4g-fjsa-nkhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34824?format=api", "vulnerability_id": "VCID-9g7s-y7nq-xfbb", "summary": "Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22939.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22939.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22939", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31612", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31214", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3142", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31294", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3166", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.3165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31629", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31597", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039", "reference_id": "1993039", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993039" }, { "reference_url": "https://security.archlinux.org/AVG-2283", "reference_id": "AVG-2283", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2283" }, { "reference_url": "https://security.gentoo.org/glsa/202401-02", "reference_id": "GLSA-202401-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202401-02" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3280", "reference_id": "RHSA-2021:3280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3281", "reference_id": "RHSA-2021:3281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3623", "reference_id": "RHSA-2021:3623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3638", "reference_id": "RHSA-2021:3638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3639", "reference_id": "RHSA-2021:3639", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3666", "reference_id": "RHSA-2021:3666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3666" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-22939" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9g7s-y7nq-xfbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53933?format=api", "vulnerability_id": "VCID-b54b-pd2b-bygm", "summary": "llhttp allows HTTP Request Smuggling via Flawed Parsing of Transfer-Encoding\nThe llhttp parser in the http module in Node.js v17.x does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).\n\nImpacts:\n\n- All versions of the nodejs 18.x, 16.x, and 14.x releases lines.\n- llhttp v6.0.7 and llhttp v2.1.5 contains the fixes that were updated inside Node.js", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32213.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.88458", "scoring_system": "epss", "scoring_elements": "0.99508", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.88458", "scoring_system": "epss", "scoring_elements": "0.99507", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.88458", "scoring_system": "epss", "scoring_elements": "0.99506", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.88458", "scoring_system": "epss", "scoring_elements": "0.99505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.88458", "scoring_system": "epss", "scoring_elements": "0.99504", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.89626", "scoring_system": "epss", "scoring_elements": "0.9956", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.89626", "scoring_system": "epss", "scoring_elements": "0.99561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.89626", "scoring_system": "epss", "scoring_elements": "0.99559", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89626", "scoring_system": "epss", "scoring_elements": "0.99558", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89626", "scoring_system": "epss", "scoring_elements": "0.99557", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32213" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb" }, { "reference_url": "https://hackerone.com/reports/1524555", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://hackerone.com/reports/1524555" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ICG6CSIB3GUWH5DUSQEVX53MOJW7LYK", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ICG6CSIB3GUWH5DUSQEVX53MOJW7LYK" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ICG6CSIB3GUWH5DUSQEVX53MOJW7LYK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ICG6CSIB3GUWH5DUSQEVX53MOJW7LYK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCNN3YG2BCLS4ZEKJ3CLSUT6AS7AXTH3", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCNN3YG2BCLS4ZEKJ3CLSUT6AS7AXTH3" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCNN3YG2BCLS4ZEKJ3CLSUT6AS7AXTH3/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCNN3YG2BCLS4ZEKJ3CLSUT6AS7AXTH3/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMQK5L5SBYD47QQZ67LEMHNQ662GH3OY", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMQK5L5SBYD47QQZ67LEMHNQ662GH3OY" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMQK5L5SBYD47QQZ67LEMHNQ662GH3OY/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMQK5L5SBYD47QQZ67LEMHNQ662GH3OY/" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32213" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220915-0001" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220915-0001/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5326", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2023/dsa-5326" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105430", "reference_id": "2105430", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105430" }, { "reference_url": "https://github.com/advisories/GHSA-5689-v88g-g6rv", "reference_id": "GHSA-5689-v88g-g6rv", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5689-v88g-g6rv" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6389", "reference_id": "RHSA-2022:6389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6448", "reference_id": "RHSA-2022:6448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6449", "reference_id": "RHSA-2022:6449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6595", "reference_id": "RHSA-2022:6595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6985", "reference_id": "RHSA-2022:6985", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6985" }, { "reference_url": "https://usn.ubuntu.com/6491-1/", "reference_id": "USN-6491-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6491-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-32213", "GHSA-5689-v88g-g6rv" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b54b-pd2b-bygm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62479?format=api", "vulnerability_id": "VCID-dfdy-vhdd-5kh4", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35256.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35256.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03611", "scoring_system": "epss", "scoring_elements": "0.87819", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03611", "scoring_system": "epss", "scoring_elements": "0.87822", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88301", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88361", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88358", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88357", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88374", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88315", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.8832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03945", "scoring_system": "epss", "scoring_elements": "0.88339", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1675191", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T13:21:44Z/" } ], "url": "https://hackerone.com/reports/1675191" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130518", "reference_id": "2130518", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130518" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35256", "reference_id": "CVE-2022-35256", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35256" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6963", "reference_id": "RHSA-2022:6963", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6963" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6964", "reference_id": "RHSA-2022:6964", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6964" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7044", "reference_id": "RHSA-2022:7044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7821", "reference_id": "RHSA-2022:7821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7830", "reference_id": "RHSA-2022:7830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0321", "reference_id": "RHSA-2023:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1533", "reference_id": "RHSA-2023:1533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1742", "reference_id": "RHSA-2023:1742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1742" }, { "reference_url": "https://usn.ubuntu.com/6491-1/", "reference_id": "USN-6491-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6491-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-35256" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dfdy-vhdd-5kh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62473?format=api", "vulnerability_id": "VCID-e18p-c3m9-2qgy", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44532.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44532.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32731", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32862", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32897", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32718", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32756", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.3273", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32771", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32748", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32567", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32451", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32368", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177", "reference_id": "1004177", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040846", "reference_id": "2040846", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040846" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7044", "reference_id": "RHSA-2022:7044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7830", "reference_id": "RHSA-2022:7830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9073", "reference_id": "RHSA-2022:9073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1742", "reference_id": "RHSA-2023:1742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3742", "reference_id": "RHSA-2023:3742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3742" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-44532" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e18p-c3m9-2qgy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11561?format=api", "vulnerability_id": "VCID-gwyr-ac4e-dqfa", "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')\nThe llhttp parser accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22959.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22959.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43574", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43657", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43706", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43756", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43779", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43746", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.4373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43791", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43783", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43715", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1238709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hackerone.com/reports/1238709" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014057", "reference_id": "2014057", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014057" }, { "reference_url": "https://security.archlinux.org/ASA-202110-4", "reference_id": "ASA-202110-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202110-4" }, { "reference_url": "https://security.archlinux.org/AVG-2460", "reference_id": "AVG-2460", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2460" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22959", "reference_id": "CVE-2021-22959", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22959" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5171", "reference_id": "RHSA-2021:5171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0041", "reference_id": "RHSA-2022:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0246", "reference_id": "RHSA-2022:0246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0350", "reference_id": "RHSA-2022:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-22959" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwyr-ac4e-dqfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78661?format=api", "vulnerability_id": "VCID-hnjv-fp2r-vqfq", "summary": "Node.js: insecure loading of ICU data through ICU_DATA environment variable", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23920.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23920.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23920", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26323", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26602", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26608", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26505", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26483", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26446", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26385", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26378", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26699", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26553", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031834", "reference_id": "1031834", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031834" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172217", "reference_id": "2172217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172217" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5395", "reference_id": "dsa-5395", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T14:22:16Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5395" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/", "reference_id": "february-2023-security-releases", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T14:22:16Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00038.html", "reference_id": "msg00038.html", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T14:22:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00038.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230316-0008/", "reference_id": "ntap-20230316-0008", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T14:22:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230316-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1533", "reference_id": "RHSA-2023:1533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1582", "reference_id": "RHSA-2023:1582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1582" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1583", "reference_id": "RHSA-2023:1583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1742", "reference_id": "RHSA-2023:1742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1743", "reference_id": "RHSA-2023:1743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1744", "reference_id": "RHSA-2023:1744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2654", "reference_id": "RHSA-2023:2654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2655", "reference_id": "RHSA-2023:2655", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2655" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5533", "reference_id": "RHSA-2023:5533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5533" }, { "reference_url": "https://usn.ubuntu.com/6672-1/", "reference_id": "USN-6672-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6672-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2023-23920" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hnjv-fp2r-vqfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13041?format=api", "vulnerability_id": "VCID-m5ae-uc68-d3g2", "summary": "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')\nThis advisory has been marked as a false positive.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56291", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56372", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56313", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00505", "scoring_system": "epss", "scoring_elements": "0.66171", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71088", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71111", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71096", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.7108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71076", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71058", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1431042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hackerone.com/reports/1431042" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220325-0007/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220325-0007/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220729-0004/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2022/dsa-5170" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177", "reference_id": "1004177", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040862", "reference_id": "2040862", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040862" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21824", "reference_id": "CVE-2022-21824", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21824" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7044", "reference_id": "RHSA-2022:7044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7830", "reference_id": "RHSA-2022:7830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9073", "reference_id": "RHSA-2022:9073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1742", "reference_id": "RHSA-2023:1742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3742", "reference_id": "RHSA-2023:3742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3742" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-21824" ], "risk_score": 3.7, "exploitability": "0.5", "weighted_severity": "7.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5ae-uc68-d3g2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62480?format=api", "vulnerability_id": "VCID-m7rw-arzq-jba1", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43548.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43548.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68402", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68536", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68398", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68466", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68492", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.6848", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68498", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68476", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68531", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68422", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023518", "reference_id": "1023518", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023518" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140911", "reference_id": "2140911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140911" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00038.html", "reference_id": "msg00038.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T14:03:01Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00038.html" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/", "reference_id": "november-2022-security-releases", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T14:03:01Z/" } ], "url": "https://nodejs.org/en/blog/vulnerability/november-2022-security-releases/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230120-0004/", "reference_id": "ntap-20230120-0004", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T14:03:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230120-0004/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230427-0007/", "reference_id": "ntap-20230427-0007", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-24T14:03:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8832", "reference_id": "RHSA-2022:8832", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8832" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8833", "reference_id": "RHSA-2022:8833", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8833" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9073", "reference_id": "RHSA-2022:9073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0050", "reference_id": "RHSA-2023:0050", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0050" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0321", "reference_id": "RHSA-2023:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0321" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0612", "reference_id": "RHSA-2023:0612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1533", "reference_id": "RHSA-2023:1533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1742", "reference_id": "RHSA-2023:1742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1742" }, { "reference_url": "https://usn.ubuntu.com/6491-1/", "reference_id": "USN-6491-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6491-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-43548" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m7rw-arzq-jba1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62474?format=api", "vulnerability_id": "VCID-ms5y-gp7v-2qay", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44533.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44533.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58428", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58429", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58442", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61987", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62008", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61997", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61977", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62019", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62024", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61846", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6192", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177", "reference_id": "1004177", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004177" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040856", "reference_id": "2040856", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040856" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7044", "reference_id": "RHSA-2022:7044", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7830", "reference_id": "RHSA-2022:7830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:9073", "reference_id": "RHSA-2022:9073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:9073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1742", "reference_id": "RHSA-2023:1742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3742", "reference_id": "RHSA-2023:3742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3742" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-44533" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ms5y-gp7v-2qay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48670?format=api", "vulnerability_id": "VCID-n91z-kugd-ebb5", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70267", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70279", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70273", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70319", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70333", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70357", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70342", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70372", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70381", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70362", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70414", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70423", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00632", "scoring_system": "epss", "scoring_elements": "0.70422", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311", "reference_id": "1879311", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4272", "reference_id": "RHSA-2020:4272", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4272" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4903", "reference_id": "RHSA-2020:4903", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4903" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5086", "reference_id": "RHSA-2020:5086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5086" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2020-8201" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n91z-kugd-ebb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62472?format=api", "vulnerability_id": "VCID-pqnn-ers1-3fec", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22884.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22884.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22884", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5038", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50401", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.5044", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50449", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50507", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50484", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50469", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50512", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50517", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0027", "scoring_system": "epss", "scoring_elements": "0.50493", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22884" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024", "reference_id": "1932024", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932024" }, { "reference_url": "https://security.archlinux.org/AVG-1604", "reference_id": "AVG-1604", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1604" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0734", "reference_id": "RHSA-2021:0734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0735", "reference_id": "RHSA-2021:0735", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0735" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0738", "reference_id": "RHSA-2021:0738", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0738" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0739", "reference_id": "RHSA-2021:0739", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0740", "reference_id": "RHSA-2021:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0741", "reference_id": "RHSA-2021:0741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0744", "reference_id": "RHSA-2021:0744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0827", "reference_id": "RHSA-2021:0827", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0827" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0830", "reference_id": "RHSA-2021:0830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0831", "reference_id": "RHSA-2021:0831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0831" }, { "reference_url": "https://usn.ubuntu.com/6418-1/", "reference_id": "USN-6418-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6418-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038014?format=api", "purl": "pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-53xm-8w84-93cx" }, { "vulnerability": "VCID-5cf7-va9h-h3gy" }, { "vulnerability": "VCID-7tpb-9zrz-e7e1" }, { "vulnerability": "VCID-8c4g-fjsa-nkhw" }, { "vulnerability": "VCID-9g7s-y7nq-xfbb" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-b54b-pd2b-bygm" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dfdy-vhdd-5kh4" }, { "vulnerability": "VCID-e18p-c3m9-2qgy" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-gwyr-ac4e-dqfa" }, { "vulnerability": "VCID-hnjv-fp2r-vqfq" }, { "vulnerability": "VCID-m5ae-uc68-d3g2" }, { "vulnerability": "VCID-m7rw-arzq-jba1" }, { "vulnerability": "VCID-ms5y-gp7v-2qay" }, { "vulnerability": "VCID-n91z-kugd-ebb5" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-pqnn-ers1-3fec" }, { "vulnerability": "VCID-q8th-849w-bfhp" }, { "vulnerability": "VCID-tnhd-rr89-9udh" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-wzcw-dd7m-zkaz" }, { "vulnerability": "VCID-xnzh-wpd4-63f9" }, { "vulnerability": "VCID-zj4d-e8r7-ufg3" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" }, { "vulnerability": "VCID-ztt4-vnk7-7ycq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-22884" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqnn-ers1-3fec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62471?format=api", "vulnerability_id": "VCID-q8th-849w-bfhp", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22883.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22883.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22883", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.99544", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.99553", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.9955", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.99551", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.99545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.99546", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.99547", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.89427", "scoring_system": "epss", "scoring_elements": "0.99548", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22884" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014", "reference_id": "1932014", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1932014" }, { "reference_url": "https://security.archlinux.org/AVG-1604", "reference_id": "AVG-1604", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1604" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0734", "reference_id": "RHSA-2021:0734", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0734" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0735", "reference_id": "RHSA-2021:0735", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0735" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0738", "reference_id": "RHSA-2021:0738", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0738" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0739", "reference_id": "RHSA-2021:0739", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0739" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0740", "reference_id": "RHSA-2021:0740", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0740" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0741", "reference_id": "RHSA-2021:0741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0744", "reference_id": "RHSA-2021:0744", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0744" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0827", "reference_id": "RHSA-2021:0827", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0827" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0830", "reference_id": "RHSA-2021:0830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0831", "reference_id": "RHSA-2021:0831", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0831" }, { "reference_url": "https://usn.ubuntu.com/6418-1/", "reference_id": "USN-6418-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6418-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038014?format=api", "purl": "pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-53xm-8w84-93cx" }, { "vulnerability": "VCID-5cf7-va9h-h3gy" }, { "vulnerability": "VCID-7tpb-9zrz-e7e1" }, { "vulnerability": "VCID-8c4g-fjsa-nkhw" }, { "vulnerability": "VCID-9g7s-y7nq-xfbb" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-b54b-pd2b-bygm" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dfdy-vhdd-5kh4" }, { "vulnerability": "VCID-e18p-c3m9-2qgy" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-gwyr-ac4e-dqfa" }, { "vulnerability": "VCID-hnjv-fp2r-vqfq" }, { "vulnerability": "VCID-m5ae-uc68-d3g2" }, { "vulnerability": "VCID-m7rw-arzq-jba1" }, { "vulnerability": "VCID-ms5y-gp7v-2qay" }, { "vulnerability": "VCID-n91z-kugd-ebb5" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-pqnn-ers1-3fec" }, { "vulnerability": "VCID-q8th-849w-bfhp" }, { "vulnerability": "VCID-tnhd-rr89-9udh" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-wzcw-dd7m-zkaz" }, { "vulnerability": "VCID-xnzh-wpd4-63f9" }, { "vulnerability": "VCID-zj4d-e8r7-ufg3" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" }, { "vulnerability": "VCID-ztt4-vnk7-7ycq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-22883" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8th-849w-bfhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11473?format=api", "vulnerability_id": "VCID-tnhd-rr89-9udh", "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')\nThe parse function in llhttp ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22960.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22960.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45642", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.456", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45651", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4566", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45729", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45677", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45733", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45751", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45779", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4572", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21824" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1238099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hackerone.com/reports/1238099" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014059", "reference_id": "2014059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014059" }, { "reference_url": "https://security.archlinux.org/ASA-202110-4", "reference_id": "ASA-202110-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202110-4" }, { "reference_url": "https://security.archlinux.org/AVG-2460", "reference_id": "AVG-2460", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2460" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22960", "reference_id": "CVE-2021-22960", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22960" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5171", "reference_id": "RHSA-2021:5171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0041", "reference_id": "RHSA-2022:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0246", "reference_id": "RHSA-2022:0246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0350", "reference_id": "RHSA-2022:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4914", "reference_id": "RHSA-2022:4914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4914" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2021-22960" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tnhd-rr89-9udh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62476?format=api", "vulnerability_id": "VCID-wzcw-dd7m-zkaz", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32215.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.87391", "scoring_system": "epss", "scoring_elements": "0.99463", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.87391", "scoring_system": "epss", "scoring_elements": "0.99459", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.87391", "scoring_system": "epss", "scoring_elements": "0.9946", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.87391", "scoring_system": "epss", "scoring_elements": "0.99462", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.88764", "scoring_system": "epss", "scoring_elements": "0.99512", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.88764", "scoring_system": "epss", "scoring_elements": "0.99513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.88764", "scoring_system": "epss", "scoring_elements": "0.99508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.88764", "scoring_system": "epss", "scoring_elements": "0.9951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.88764", "scoring_system": "epss", "scoring_elements": "0.99511", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1501679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hackerone.com/reports/1501679" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105426", "reference_id": "2105426", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105426" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32215", "reference_id": "CVE-2022-32215", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32215" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6389", "reference_id": "RHSA-2022:6389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6448", "reference_id": "RHSA-2022:6448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6449", "reference_id": "RHSA-2022:6449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6595", "reference_id": "RHSA-2022:6595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6985", "reference_id": "RHSA-2022:6985", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6985" }, { "reference_url": "https://usn.ubuntu.com/6491-1/", "reference_id": "USN-6491-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6491-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-32215" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wzcw-dd7m-zkaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62478?format=api", "vulnerability_id": "VCID-xnzh-wpd4-63f9", "summary": "Multiple vulnerabilities have been discovered in Node.js.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35255.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35255.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78844", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78868", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78851", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78841", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78869", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78867", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78864", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78893", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.789", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.788", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78829", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78812", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01191", "scoring_system": "epss", "scoring_elements": "0.78838", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://hackerone.com/reports/1690000", "reference_id": "1690000", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:23:49Z/" } ], "url": "https://hackerone.com/reports/1690000" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130517", "reference_id": "2130517", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130517" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230113-0002/", "reference_id": "ntap-20230113-0002", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-24T13:23:49Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230113-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6963", "reference_id": "RHSA-2022:6963", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6963" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6964", "reference_id": "RHSA-2022:6964", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6964" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7821", "reference_id": "RHSA-2022:7821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7821" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2022-35255" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xnzh-wpd4-63f9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48673?format=api", "vulnerability_id": "VCID-zj4d-e8r7-ufg3", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93694", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93759", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.9376", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93726", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93732", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.9375", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11865", "scoring_system": "epss", "scoring_elements": "0.93757", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8287" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016690", "reference_id": "1016690", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016690" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863", "reference_id": "1912863", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912863" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364", "reference_id": "979364", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364" }, { "reference_url": "https://security.archlinux.org/ASA-202101-16", "reference_id": "ASA-202101-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-16" }, { "reference_url": "https://security.archlinux.org/AVG-1400", "reference_id": "AVG-1400", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0421", "reference_id": "RHSA-2021:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0485", "reference_id": "RHSA-2021:0485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0521", "reference_id": "RHSA-2021:0521", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0548", "reference_id": "RHSA-2021:0548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0549", "reference_id": "RHSA-2021:0549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0551", "reference_id": "RHSA-2021:0551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0551" }, { "reference_url": "https://usn.ubuntu.com/5563-1/", "reference_id": "USN-5563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5563-1/" }, { "reference_url": "https://usn.ubuntu.com/6380-1/", "reference_id": "USN-6380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6380-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038014?format=api", "purl": "pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-53xm-8w84-93cx" }, { "vulnerability": "VCID-5cf7-va9h-h3gy" }, { "vulnerability": "VCID-7tpb-9zrz-e7e1" }, { "vulnerability": "VCID-8c4g-fjsa-nkhw" }, { "vulnerability": "VCID-9g7s-y7nq-xfbb" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-b54b-pd2b-bygm" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dfdy-vhdd-5kh4" }, { "vulnerability": "VCID-e18p-c3m9-2qgy" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-gwyr-ac4e-dqfa" }, { "vulnerability": "VCID-hnjv-fp2r-vqfq" }, { "vulnerability": "VCID-m5ae-uc68-d3g2" }, { "vulnerability": "VCID-m7rw-arzq-jba1" }, { "vulnerability": "VCID-ms5y-gp7v-2qay" }, { "vulnerability": "VCID-n91z-kugd-ebb5" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-pqnn-ers1-3fec" }, { "vulnerability": "VCID-q8th-849w-bfhp" }, { "vulnerability": "VCID-tnhd-rr89-9udh" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-wzcw-dd7m-zkaz" }, { "vulnerability": "VCID-xnzh-wpd4-63f9" }, { "vulnerability": "VCID-zj4d-e8r7-ufg3" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" }, { "vulnerability": "VCID-ztt4-vnk7-7ycq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2020-8287" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zj4d-e8r7-ufg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48672?format=api", "vulnerability_id": "VCID-ztt4-vnk7-7ycq", "summary": "Multiple vulnerabilities have been found in NodeJS, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8265.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73197", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73338", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73326", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.7334", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73207", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73228", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73276", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73255", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73248", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73291", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.733", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73292", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854", "reference_id": "1912854", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912854" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364", "reference_id": "979364", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979364" }, { "reference_url": "https://security.archlinux.org/ASA-202101-16", "reference_id": "ASA-202101-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202101-16" }, { "reference_url": "https://security.archlinux.org/AVG-1400", "reference_id": "AVG-1400", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1400" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0421", "reference_id": "RHSA-2021:0421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0485", "reference_id": "RHSA-2021:0485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0521", "reference_id": "RHSA-2021:0521", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0521" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0548", "reference_id": "RHSA-2021:0548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0549", "reference_id": "RHSA-2021:0549", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0551", "reference_id": "RHSA-2021:0551", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0551" }, { "reference_url": "https://usn.ubuntu.com/6380-1/", "reference_id": "USN-6380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6380-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1038014?format=api", "purl": "pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-53xm-8w84-93cx" }, { "vulnerability": "VCID-5cf7-va9h-h3gy" }, { "vulnerability": "VCID-7tpb-9zrz-e7e1" }, { "vulnerability": "VCID-8c4g-fjsa-nkhw" }, { "vulnerability": "VCID-9g7s-y7nq-xfbb" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-b54b-pd2b-bygm" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dfdy-vhdd-5kh4" }, { "vulnerability": "VCID-e18p-c3m9-2qgy" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-gwyr-ac4e-dqfa" }, { "vulnerability": "VCID-hnjv-fp2r-vqfq" }, { "vulnerability": "VCID-m5ae-uc68-d3g2" }, { "vulnerability": "VCID-m7rw-arzq-jba1" }, { "vulnerability": "VCID-ms5y-gp7v-2qay" }, { "vulnerability": "VCID-n91z-kugd-ebb5" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-pqnn-ers1-3fec" }, { "vulnerability": "VCID-q8th-849w-bfhp" }, { "vulnerability": "VCID-tnhd-rr89-9udh" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-wzcw-dd7m-zkaz" }, { "vulnerability": "VCID-xnzh-wpd4-63f9" }, { "vulnerability": "VCID-zj4d-e8r7-ufg3" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" }, { "vulnerability": "VCID-ztt4-vnk7-7ycq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@10.24.0~dfsg-1~deb10u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994760?format=api", "purl": "pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1vp3-fzdr-yqbm" }, { "vulnerability": "VCID-2t7c-dju9-pff6" }, { "vulnerability": "VCID-2z1f-7jkw-17av" }, { "vulnerability": "VCID-38k9-23j3-eqh7" }, { "vulnerability": "VCID-43sf-4r41-wugc" }, { "vulnerability": "VCID-96yh-1wub-zucg" }, { "vulnerability": "VCID-98fy-tedc-ube7" }, { "vulnerability": "VCID-9yq7-aba3-c7c3" }, { "vulnerability": "VCID-bjza-25hu-vkad" }, { "vulnerability": "VCID-bx67-aud6-b3fa" }, { "vulnerability": "VCID-c8xz-v6h3-6ueb" }, { "vulnerability": "VCID-dgkh-jdah-wfh9" }, { "vulnerability": "VCID-dt7u-3usg-9uet" }, { "vulnerability": "VCID-e6gj-fe31-kkh5" }, { "vulnerability": "VCID-e7u5-356v-jbg7" }, { "vulnerability": "VCID-kj75-vmwa-gqgq" }, { "vulnerability": "VCID-nenk-4cgd-fugv" }, { "vulnerability": "VCID-sag8-repb-g3f4" }, { "vulnerability": "VCID-twc8-ewm7-wkb1" }, { "vulnerability": "VCID-u8bq-8jp4-jkem" }, { "vulnerability": "VCID-v7uy-445x-tuan" }, { "vulnerability": "VCID-vkvx-gxbu-3uau" }, { "vulnerability": "VCID-wf5t-3pwz-c7d7" }, { "vulnerability": "VCID-x1an-pjq4-nbby" }, { "vulnerability": "VCID-zstw-3wmu-u3c8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" } ], "aliases": [ "CVE-2020-8265" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztt4-vnk7-7ycq" } ], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4" }