Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/nodejs@16.4.0-1
Typealpm
Namespacearchlinux
Namenodejs
Version16.4.0-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version16.4.1-1
Latest_non_vulnerable_version23.11.1-1
Affected_by_vulnerabilities
0
url VCID-4kjh-zmaz-tqb7
vulnerability_id VCID-4kjh-zmaz-tqb7
summary
Regular Expression Denial of Service in hosted-git-info
The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23362.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23362
reference_id
reference_type
scores
0
value 0.00554
scoring_system epss
scoring_elements 0.68269
published_at 2026-05-14T12:55:00Z
1
value 0.00554
scoring_system epss
scoring_elements 0.68212
published_at 2026-05-12T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68186
published_at 2026-05-11T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68219
published_at 2026-05-09T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.68181
published_at 2026-05-07T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68136
published_at 2026-05-05T12:55:00Z
6
value 0.00554
scoring_system epss
scoring_elements 0.68162
published_at 2026-04-29T12:55:00Z
7
value 0.00554
scoring_system epss
scoring_elements 0.68157
published_at 2026-04-26T12:55:00Z
8
value 0.00554
scoring_system epss
scoring_elements 0.68147
published_at 2026-04-24T12:55:00Z
9
value 0.00554
scoring_system epss
scoring_elements 0.6803
published_at 2026-04-07T12:55:00Z
10
value 0.00554
scoring_system epss
scoring_elements 0.6812
published_at 2026-04-11T12:55:00Z
11
value 0.00554
scoring_system epss
scoring_elements 0.68011
published_at 2026-04-01T12:55:00Z
12
value 0.00554
scoring_system epss
scoring_elements 0.68096
published_at 2026-04-09T12:55:00Z
13
value 0.00554
scoring_system epss
scoring_elements 0.68033
published_at 2026-04-02T12:55:00Z
14
value 0.00554
scoring_system epss
scoring_elements 0.68052
published_at 2026-04-04T12:55:00Z
15
value 0.00554
scoring_system epss
scoring_elements 0.68081
published_at 2026-04-08T12:55:00Z
16
value 0.00554
scoring_system epss
scoring_elements 0.68105
published_at 2026-04-21T12:55:00Z
17
value 0.00554
scoring_system epss
scoring_elements 0.68123
published_at 2026-04-18T12:55:00Z
18
value 0.00554
scoring_system epss
scoring_elements 0.68111
published_at 2026-04-16T12:55:00Z
19
value 0.00554
scoring_system epss
scoring_elements 0.68073
published_at 2026-04-13T12:55:00Z
20
value 0.00554
scoring_system epss
scoring_elements 0.68107
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23362
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23362
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/npm/hosted-git-info
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/hosted-git-info
6
reference_url https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7
7
reference_url https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01
8
reference_url https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3
9
reference_url https://github.com/npm/hosted-git-info/commits/v2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/hosted-git-info/commits/v2
10
reference_url https://github.com/npm/hosted-git-info/pull/76
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/npm/hosted-git-info/pull/76
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-23362
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-23362
12
reference_url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356
13
reference_url https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1943208
reference_id 1943208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1943208
15
reference_url https://security.archlinux.org/ASA-202107-13
reference_id ASA-202107-13
reference_type
scores
url https://security.archlinux.org/ASA-202107-13
16
reference_url https://security.archlinux.org/AVG-2126
reference_id AVG-2126
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2126
17
reference_url https://github.com/advisories/GHSA-43f8-2h32-f4cj
reference_id GHSA-43f8-2h32-f4cj
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-43f8-2h32-f4cj
18
reference_url https://access.redhat.com/errata/RHSA-2021:2438
reference_id RHSA-2021:2438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2438
19
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
20
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
21
reference_url https://access.redhat.com/errata/RHSA-2021:3073
reference_id RHSA-2021:3073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3073
22
reference_url https://access.redhat.com/errata/RHSA-2021:3074
reference_id RHSA-2021:3074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3074
23
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
24
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
25
reference_url https://usn.ubuntu.com/USN-5216-1/
reference_id USN-USN-5216-1
reference_type
scores
url https://usn.ubuntu.com/USN-5216-1/
fixed_packages
0
url pkg:alpm/archlinux/nodejs@16.4.1-1
purl pkg:alpm/archlinux/nodejs@16.4.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/nodejs@16.4.1-1
aliases CVE-2021-23362, GHSA-43f8-2h32-f4cj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kjh-zmaz-tqb7
1
url VCID-b7hq-5yyx-tuhs
vulnerability_id VCID-b7hq-5yyx-tuhs
summary Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22921
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67291
published_at 2026-05-14T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67048
published_at 2026-04-01T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67085
published_at 2026-04-02T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67109
published_at 2026-04-04T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.67083
published_at 2026-04-07T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67133
published_at 2026-04-08T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67145
published_at 2026-04-09T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67164
published_at 2026-04-11T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.6715
published_at 2026-04-12T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.67119
published_at 2026-04-13T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-16T12:55:00Z
11
value 0.00527
scoring_system epss
scoring_elements 0.67167
published_at 2026-04-18T12:55:00Z
12
value 0.00527
scoring_system epss
scoring_elements 0.67148
published_at 2026-04-21T12:55:00Z
13
value 0.00527
scoring_system epss
scoring_elements 0.6717
published_at 2026-04-24T12:55:00Z
14
value 0.00527
scoring_system epss
scoring_elements 0.67182
published_at 2026-04-29T12:55:00Z
15
value 0.00527
scoring_system epss
scoring_elements 0.67151
published_at 2026-05-05T12:55:00Z
16
value 0.00527
scoring_system epss
scoring_elements 0.67192
published_at 2026-05-07T12:55:00Z
17
value 0.00527
scoring_system epss
scoring_elements 0.67231
published_at 2026-05-09T12:55:00Z
18
value 0.00527
scoring_system epss
scoring_elements 0.67204
published_at 2026-05-11T12:55:00Z
19
value 0.00527
scoring_system epss
scoring_elements 0.67228
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22921
1
reference_url https://security.archlinux.org/AVG-2130
reference_id AVG-2130
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2130
fixed_packages
0
url pkg:alpm/archlinux/nodejs@16.4.1-1
purl pkg:alpm/archlinux/nodejs@16.4.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/nodejs@16.4.1-1
aliases CVE-2021-22921
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7hq-5yyx-tuhs
2
url VCID-nj6f-gujk-wqah
vulnerability_id VCID-nj6f-gujk-wqah
summary A buffer overread vulnerability has been found in libuv.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22918.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22918
reference_id
reference_type
scores
0
value 0.00718
scoring_system epss
scoring_elements 0.72392
published_at 2026-04-07T12:55:00Z
1
value 0.00718
scoring_system epss
scoring_elements 0.72617
published_at 2026-05-14T12:55:00Z
2
value 0.00718
scoring_system epss
scoring_elements 0.72535
published_at 2026-05-11T12:55:00Z
3
value 0.00718
scoring_system epss
scoring_elements 0.72561
published_at 2026-05-12T12:55:00Z
4
value 0.00718
scoring_system epss
scoring_elements 0.72397
published_at 2026-04-02T12:55:00Z
5
value 0.00718
scoring_system epss
scoring_elements 0.72415
published_at 2026-04-04T12:55:00Z
6
value 0.00718
scoring_system epss
scoring_elements 0.72431
published_at 2026-04-08T12:55:00Z
7
value 0.00718
scoring_system epss
scoring_elements 0.72443
published_at 2026-04-09T12:55:00Z
8
value 0.00718
scoring_system epss
scoring_elements 0.72466
published_at 2026-04-11T12:55:00Z
9
value 0.00718
scoring_system epss
scoring_elements 0.72448
published_at 2026-04-12T12:55:00Z
10
value 0.00718
scoring_system epss
scoring_elements 0.72438
published_at 2026-04-13T12:55:00Z
11
value 0.00718
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-16T12:55:00Z
12
value 0.00718
scoring_system epss
scoring_elements 0.72489
published_at 2026-04-18T12:55:00Z
13
value 0.00718
scoring_system epss
scoring_elements 0.72478
published_at 2026-04-21T12:55:00Z
14
value 0.00718
scoring_system epss
scoring_elements 0.72521
published_at 2026-04-24T12:55:00Z
15
value 0.00718
scoring_system epss
scoring_elements 0.72528
published_at 2026-04-26T12:55:00Z
16
value 0.00718
scoring_system epss
scoring_elements 0.72525
published_at 2026-04-29T12:55:00Z
17
value 0.00718
scoring_system epss
scoring_elements 0.72517
published_at 2026-05-05T12:55:00Z
18
value 0.00718
scoring_system epss
scoring_elements 0.72547
published_at 2026-05-07T12:55:00Z
19
value 0.00718
scoring_system epss
scoring_elements 0.72572
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22918
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1979338
reference_id 1979338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1979338
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990561
reference_id 990561
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990561
5
reference_url https://security.archlinux.org/ASA-202107-13
reference_id ASA-202107-13
reference_type
scores
url https://security.archlinux.org/ASA-202107-13
6
reference_url https://security.archlinux.org/ASA-202107-36
reference_id ASA-202107-36
reference_type
scores
url https://security.archlinux.org/ASA-202107-36
7
reference_url https://security.archlinux.org/AVG-2126
reference_id AVG-2126
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2126
8
reference_url https://security.archlinux.org/AVG-2131
reference_id AVG-2131
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2131
9
reference_url https://security.gentoo.org/glsa/202401-23
reference_id GLSA-202401-23
reference_type
scores
url https://security.gentoo.org/glsa/202401-23
10
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
11
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
12
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
13
reference_url https://access.redhat.com/errata/RHSA-2021:3073
reference_id RHSA-2021:3073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3073
14
reference_url https://access.redhat.com/errata/RHSA-2021:3074
reference_id RHSA-2021:3074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3074
15
reference_url https://access.redhat.com/errata/RHSA-2021:3075
reference_id RHSA-2021:3075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3075
16
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
17
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
18
reference_url https://usn.ubuntu.com/5007-1/
reference_id USN-5007-1
reference_type
scores
url https://usn.ubuntu.com/5007-1/
fixed_packages
0
url pkg:alpm/archlinux/nodejs@16.4.1-1
purl pkg:alpm/archlinux/nodejs@16.4.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/nodejs@16.4.1-1
aliases CVE-2021-22918
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nj6f-gujk-wqah
3
url VCID-w93e-wkm9-kuex
vulnerability_id VCID-w93e-wkm9-kuex
summary
Regular Expression Denial of Service (ReDoS)
npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27290.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27290
reference_id
reference_type
scores
0
value 0.02458
scoring_system epss
scoring_elements 0.85393
published_at 2026-05-14T12:55:00Z
1
value 0.02458
scoring_system epss
scoring_elements 0.85355
published_at 2026-05-12T12:55:00Z
2
value 0.02458
scoring_system epss
scoring_elements 0.85342
published_at 2026-05-11T12:55:00Z
3
value 0.02458
scoring_system epss
scoring_elements 0.85347
published_at 2026-05-09T12:55:00Z
4
value 0.02458
scoring_system epss
scoring_elements 0.85329
published_at 2026-05-07T12:55:00Z
5
value 0.02458
scoring_system epss
scoring_elements 0.85302
published_at 2026-05-05T12:55:00Z
6
value 0.02458
scoring_system epss
scoring_elements 0.85287
published_at 2026-04-29T12:55:00Z
7
value 0.02458
scoring_system epss
scoring_elements 0.85289
published_at 2026-04-26T12:55:00Z
8
value 0.02458
scoring_system epss
scoring_elements 0.85281
published_at 2026-04-24T12:55:00Z
9
value 0.02458
scoring_system epss
scoring_elements 0.85257
published_at 2026-04-21T12:55:00Z
10
value 0.02665
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-04T12:55:00Z
11
value 0.02665
scoring_system epss
scoring_elements 0.85724
published_at 2026-04-01T12:55:00Z
12
value 0.02665
scoring_system epss
scoring_elements 0.85736
published_at 2026-04-02T12:55:00Z
13
value 0.02665
scoring_system epss
scoring_elements 0.8576
published_at 2026-04-07T12:55:00Z
14
value 0.02665
scoring_system epss
scoring_elements 0.85779
published_at 2026-04-08T12:55:00Z
15
value 0.02665
scoring_system epss
scoring_elements 0.8579
published_at 2026-04-09T12:55:00Z
16
value 0.02665
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-11T12:55:00Z
17
value 0.04327
scoring_system epss
scoring_elements 0.8893
published_at 2026-04-16T12:55:00Z
18
value 0.04327
scoring_system epss
scoring_elements 0.88917
published_at 2026-04-13T12:55:00Z
19
value 0.04327
scoring_system epss
scoring_elements 0.88928
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27290
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27290
4
reference_url https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/npm/ssri
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri
7
reference_url https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2
8
reference_url https://github.com/npm/ssri/commit/809c84d09ea87c3857fa171d42914586899d4538
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/commit/809c84d09ea87c3857fa171d42914586899d4538
9
reference_url https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1
10
reference_url https://github.com/npm/ssri/pull/20#issuecomment-842677644
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/npm/ssri/pull/20#issuecomment-842677644
11
reference_url https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf
12
reference_url https://npmjs.com
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://npmjs.com
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-27290
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-27290
14
reference_url https://www.npmjs.com/package/ssri
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/package/ssri
15
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941471
reference_id 1941471
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941471
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985841
reference_id 985841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985841
18
reference_url https://security.archlinux.org/ASA-202107-13
reference_id ASA-202107-13
reference_type
scores
url https://security.archlinux.org/ASA-202107-13
19
reference_url https://security.archlinux.org/AVG-2126
reference_id AVG-2126
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2126
20
reference_url https://github.com/advisories/GHSA-vx3p-948g-6vhq
reference_id GHSA-vx3p-948g-6vhq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vx3p-948g-6vhq
21
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
22
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
23
reference_url https://access.redhat.com/errata/RHSA-2021:3073
reference_id RHSA-2021:3073
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3073
24
reference_url https://access.redhat.com/errata/RHSA-2021:3074
reference_id RHSA-2021:3074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3074
25
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
26
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
fixed_packages
0
url pkg:alpm/archlinux/nodejs@16.4.1-1
purl pkg:alpm/archlinux/nodejs@16.4.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/nodejs@16.4.1-1
aliases CVE-2021-27290, GHSA-vx3p-948g-6vhq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w93e-wkm9-kuex
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/nodejs@16.4.0-1