Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-hwk3-sg9p-wqe7
Summary
json-schema is vulnerable to Prototype Pollution
json-schema before version 0.4.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
Aliases
0
alias CVE-2021-3918
1
alias GHSA-896r-f27r-55mw
Fixed_packages
0
url pkg:deb/debian/node-json-schema@0.3.0%2B~7.0.6-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/node-json-schema@0.3.0%2B~7.0.6-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-json-schema@0.3.0%252B~7.0.6-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/node-json-schema@0.3.0%2B~7.0.6-1%2Bdeb11u1
purl pkg:deb/debian/node-json-schema@0.3.0%2B~7.0.6-1%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-json-schema@0.3.0%252B~7.0.6-1%252Bdeb11u1
2
url pkg:deb/debian/node-json-schema@0.4.0%2B~7.0.9-1?distro=trixie
purl pkg:deb/debian/node-json-schema@0.4.0%2B~7.0.9-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-json-schema@0.4.0%252B~7.0.9-1%3Fdistro=trixie
3
url pkg:deb/debian/node-json-schema@0.4.0%2B~7.0.11-1?distro=trixie
purl pkg:deb/debian/node-json-schema@0.4.0%2B~7.0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-json-schema@0.4.0%252B~7.0.11-1%3Fdistro=trixie
4
url pkg:deb/debian/node-json-schema@0.4.0%2B~7.0.15-1?distro=trixie
purl pkg:deb/debian/node-json-schema@0.4.0%2B~7.0.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-json-schema@0.4.0%252B~7.0.15-1%3Fdistro=trixie
5
url pkg:npm/json-schema@0.4.0
purl pkg:npm/json-schema@0.4.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/json-schema@0.4.0
Affected_packages
0
url pkg:deb/debian/node-json-schema@0.2.3-1
purl pkg:deb/debian/node-json-schema@0.2.3-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hwk3-sg9p-wqe7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-json-schema@0.2.3-1
1
url pkg:npm/json-schema@0.2.0
purl pkg:npm/json-schema@0.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hwk3-sg9p-wqe7
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/json-schema@0.2.0
2
url pkg:npm/json-schema@0.2.2
purl pkg:npm/json-schema@0.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hwk3-sg9p-wqe7
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/json-schema@0.2.2
3
url pkg:npm/json-schema@0.2.3
purl pkg:npm/json-schema@0.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hwk3-sg9p-wqe7
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/json-schema@0.2.3
4
url pkg:npm/json-schema@0.2.4
purl pkg:npm/json-schema@0.2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hwk3-sg9p-wqe7
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/json-schema@0.2.4
5
url pkg:npm/json-schema@0.2.5
purl pkg:npm/json-schema@0.2.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hwk3-sg9p-wqe7
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/json-schema@0.2.5
6
url pkg:npm/json-schema@0.3.0
purl pkg:npm/json-schema@0.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hwk3-sg9p-wqe7
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/json-schema@0.3.0
7
url pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tz4-bphw-rbd3
1
vulnerability VCID-5cf7-va9h-h3gy
2
vulnerability VCID-7mtb-yaq7-77ep
3
vulnerability VCID-e18p-c3m9-2qgy
4
vulnerability VCID-gwyr-ac4e-dqfa
5
vulnerability VCID-hwk3-sg9p-wqe7
6
vulnerability VCID-m5ae-uc68-d3g2
7
vulnerability VCID-ms5y-gp7v-2qay
8
vulnerability VCID-tnhd-rr89-9udh
9
vulnerability VCID-turp-dju7-c7fx
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.12-2%3Farch=el7
8
url pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tz4-bphw-rbd3
1
vulnerability VCID-7mtb-yaq7-77ep
2
vulnerability VCID-c86y-234c-s3hu
3
vulnerability VCID-gwyr-ac4e-dqfa
4
vulnerability VCID-hwk3-sg9p-wqe7
5
vulnerability VCID-tnhd-rr89-9udh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs@14.18.2-1%3Farch=el7
9
url pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1tz4-bphw-rbd3
1
vulnerability VCID-7mtb-yaq7-77ep
2
vulnerability VCID-c86y-234c-s3hu
3
vulnerability VCID-gwyr-ac4e-dqfa
4
vulnerability VCID-hwk3-sg9p-wqe7
5
vulnerability VCID-tnhd-rr89-9udh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-6%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3918.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3918
reference_id
reference_type
scores
0
value 0.01262
scoring_system epss
scoring_elements 0.79497
published_at 2026-04-24T12:55:00Z
1
value 0.01262
scoring_system epss
scoring_elements 0.79384
published_at 2026-04-01T12:55:00Z
2
value 0.01262
scoring_system epss
scoring_elements 0.79391
published_at 2026-04-02T12:55:00Z
3
value 0.01262
scoring_system epss
scoring_elements 0.79413
published_at 2026-04-04T12:55:00Z
4
value 0.01262
scoring_system epss
scoring_elements 0.794
published_at 2026-04-07T12:55:00Z
5
value 0.01262
scoring_system epss
scoring_elements 0.79428
published_at 2026-04-08T12:55:00Z
6
value 0.01262
scoring_system epss
scoring_elements 0.79437
published_at 2026-04-09T12:55:00Z
7
value 0.01262
scoring_system epss
scoring_elements 0.7946
published_at 2026-04-11T12:55:00Z
8
value 0.01262
scoring_system epss
scoring_elements 0.79443
published_at 2026-04-12T12:55:00Z
9
value 0.01262
scoring_system epss
scoring_elements 0.79433
published_at 2026-04-13T12:55:00Z
10
value 0.01262
scoring_system epss
scoring_elements 0.79464
published_at 2026-04-16T12:55:00Z
11
value 0.01262
scoring_system epss
scoring_elements 0.79462
published_at 2026-04-18T12:55:00Z
12
value 0.01262
scoring_system epss
scoring_elements 0.79466
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3918
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/kriszyp/json-schema
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/kriszyp/json-schema
5
reference_url https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741
6
reference_url https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a
7
reference_url https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa
8
reference_url https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9
9
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html
10
reference_url https://security.netapp.com/advisory/ntap-20250117-0004
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20250117-0004
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2024702
reference_id 2024702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2024702
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999765
reference_id 999765
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999765
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3918
reference_id CVE-2021-3918
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-3918
14
reference_url https://github.com/advisories/GHSA-896r-f27r-55mw
reference_id GHSA-896r-f27r-55mw
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-896r-f27r-55mw
15
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
16
reference_url https://access.redhat.com/errata/RHSA-2022:0041
reference_id RHSA-2022:0041
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0041
17
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
18
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
19
reference_url https://access.redhat.com/errata/RHSA-2022:4914
reference_id RHSA-2022:4914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4914
20
reference_url https://usn.ubuntu.com/6103-1/
reference_id USN-6103-1
reference_type
scores
url https://usn.ubuntu.com/6103-1/
Weaknesses
0
cwe_id 1321
name Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
description The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
1
cwe_id 915
name Improperly Controlled Modification of Dynamically-Determined Object Attributes
description The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are to be initialized or updated in an object, but it does not properly control which attributes can be modified.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score8.1 - 10.0
Exploitability0.5
Weighted_severity9.0
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-hwk3-sg9p-wqe7