Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-gabj-syb9-c7ff
Summary
Uncontrolled Search Path Element in sharkdp/bat
bat on windows before 0.18.2 executes programs named less.exe from the current working directory. This can lead to unintended code execution.
Aliases
0
alias CVE-2021-36753
1
alias GHSA-p24j-h477-76q3
Fixed_packages
0
url pkg:alpm/archlinux/bat@0.18.2-1
purl pkg:alpm/archlinux/bat@0.18.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bat@0.18.2-1
1
url pkg:cargo/bat@0.18.2
purl pkg:cargo/bat@0.18.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:cargo/bat@0.18.2
Affected_packages
0
url pkg:alpm/archlinux/bat@0.18.1-1
purl pkg:alpm/archlinux/bat@0.18.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gabj-syb9-c7ff
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bat@0.18.1-1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36753
reference_id
reference_type
scores
0
value 0.00195
scoring_system epss
scoring_elements 0.41388
published_at 2026-04-07T12:55:00Z
1
value 0.00195
scoring_system epss
scoring_elements 0.41463
published_at 2026-04-16T12:55:00Z
2
value 0.00195
scoring_system epss
scoring_elements 0.4142
published_at 2026-04-13T12:55:00Z
3
value 0.00195
scoring_system epss
scoring_elements 0.41435
published_at 2026-04-18T12:55:00Z
4
value 0.00195
scoring_system epss
scoring_elements 0.41467
published_at 2026-04-11T12:55:00Z
5
value 0.00195
scoring_system epss
scoring_elements 0.41446
published_at 2026-04-09T12:55:00Z
6
value 0.00195
scoring_system epss
scoring_elements 0.4134
published_at 2026-04-01T12:55:00Z
7
value 0.00195
scoring_system epss
scoring_elements 0.41438
published_at 2026-04-08T12:55:00Z
8
value 0.00195
scoring_system epss
scoring_elements 0.41432
published_at 2026-04-02T12:55:00Z
9
value 0.00195
scoring_system epss
scoring_elements 0.41461
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36753
1
reference_url https://github.com/sharkdp/bat
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sharkdp/bat
2
reference_url https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956
3
reference_url https://github.com/sharkdp/bat/pull/1724
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sharkdp/bat/pull/1724
4
reference_url https://github.com/sharkdp/bat/releases/tag/v0.18.2
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sharkdp/bat/releases/tag/v0.18.2
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-36753
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-36753
6
reference_url https://rustsec.org/advisories/RUSTSEC-2021-0106.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2021-0106.html
7
reference_url https://vuln.ryotak.me/advisories/53
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://vuln.ryotak.me/advisories/53
8
reference_url https://security.archlinux.org/AVG-2165
reference_id AVG-2165
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2165
9
reference_url https://github.com/advisories/GHSA-p24j-h477-76q3
reference_id GHSA-p24j-h477-76q3
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p24j-h477-76q3
Weaknesses
0
cwe_id 427
name Uncontrolled Search Path Element
description The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Exploits
Severity_range_score4.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-gabj-syb9-c7ff