Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/node-loader-utils@0.2.16-1
purl pkg:deb/debian/node-loader-utils@0.2.16-1
Next non-vulnerable version 2.0.0-1+deb11u1
Latest non-vulnerable version 2.0.0-1+deb11u1
Risk 4.5
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-fn7h-3n1n-9bhr
Aliases:
CVE-2022-37599
GHSA-hhq3-ff78-jv3g
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) A regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils via the resourcePath variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amount of time to process. This issue has been patched in versions 1.4.2, 2.0.4 and 3.2.1.
2.0.0-1+deb11u1
Affected by 0 other vulnerabilities.
VCID-fnnx-s2c7-xyfh
Aliases:
CVE-2022-37601
GHSA-76p3-8jx3-jpfq
Prototype pollution in webpack loader-utils Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils prior to version 2.0.3 via the name variable in parseQuery.js.
2.0.0-1+deb11u1
Affected by 0 other vulnerabilities.
VCID-y1np-kma2-ayfn
Aliases:
CVE-2022-37603
GHSA-3rfm-jhwj-7488
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amount of time to process. This issue has been patched in versions 1.4.2, 2.0.4 and 3.2.1.
2.0.0-1+deb11u1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T17:53:07.723238+00:00 Debian Oval Importer Affected by VCID-fn7h-3n1n-9bhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:04:43.184352+00:00 Debian Oval Importer Affected by VCID-fnnx-s2c7-xyfh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:32:06.653348+00:00 Debian Oval Importer Affected by VCID-y1np-kma2-ayfn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-11T17:39:06.212604+00:00 Debian Oval Importer Affected by VCID-fn7h-3n1n-9bhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:52:15.450617+00:00 Debian Oval Importer Affected by VCID-fnnx-s2c7-xyfh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:20:06.374026+00:00 Debian Oval Importer Affected by VCID-y1np-kma2-ayfn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T17:26:29.839326+00:00 Debian Oval Importer Affected by VCID-fn7h-3n1n-9bhr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:45:36.789075+00:00 Debian Oval Importer Affected by VCID-fnnx-s2c7-xyfh https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:14:48.768081+00:00 Debian Oval Importer Affected by VCID-y1np-kma2-ayfn https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0