Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/ovirt-web-ui@1.9.0-1?arch=el8ev
purl pkg:rpm/redhat/ovirt-web-ui@1.9.0-1?arch=el8ev
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.0
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-c86y-234c-s3hu
Aliases:
CVE-2021-3807
GHSA-93q8-gq69-wqmw
ansi-regex is vulnerable to Inefficient Regular Expression Complexity There are no reported fixed by versions.
VCID-eg6c-bq3z-4qcn
Aliases:
CVE-2022-31051
GHSA-x2pg-mjhr-2m5x
Exposure of Sensitive Information to an Unauthorized Actor in semantic-release ### Impact _What kind of vulnerability is it? Who is impacted?_ Secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by [encodeURI](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI). Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Fixed in 19.0.3 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Secrets that do not contain characters that are excluded from encoding with `encodeURI` when included in a URL are already masked properly. ### References _Are there any links users can visit to find out more?_ * https://github.com/semantic-release/semantic-release/releases/tag/v19.0.3 * https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI ### For more information If you have any questions or comments about this advisory: * Open a discussion in [semantic-release discussions](https://github.com/semantic-release/semantic-release/discussions) There are no reported fixed by versions.
VCID-q2nz-yft3-bqb2
Aliases:
CVE-2021-33623
GHSA-7p7h-4mm5-852v
Uncontrolled Resource Consumption in trim-newlines @rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the `.end()` method. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:02:11.188691+00:00 RedHat Importer Affected by VCID-q2nz-yft3-bqb2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33623.json 38.0.0
2026-04-01T14:01:21.550467+00:00 RedHat Importer Affected by VCID-c86y-234c-s3hu https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3807.json 38.0.0
2026-04-01T13:58:12.192502+00:00 RedHat Importer Affected by VCID-eg6c-bq3z-4qcn https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31051.json 38.0.0