Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/nodejs@14.17.5-r0?arch=x86&distroversion=v3.14&reponame=main
Typeapk
Namespacealpine
Namenodejs
Version14.17.5-r0
Qualifiers
arch x86
distroversion v3.14
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version14.17.6-r0
Latest_non_vulnerable_version14.21.3-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1xdz-dku3-qqc4
vulnerability_id VCID-1xdz-dku3-qqc4
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3672
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-01T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17097
published_at 2026-04-16T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17358
published_at 2026-04-04T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17138
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17229
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17287
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17265
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17216
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17157
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.1731
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3672
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1988342
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1988342
3
reference_url https://c-ares.haxx.se/adv_20210810.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:33Z/
url https://c-ares.haxx.se/adv_20210810.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3672
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992053
reference_id 992053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992053
7
reference_url https://security.archlinux.org/ASA-202108-13
reference_id ASA-202108-13
reference_type
scores
url https://security.archlinux.org/ASA-202108-13
8
reference_url https://security.archlinux.org/AVG-2268
reference_id AVG-2268
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2268
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3672
reference_id CVE-2021-3672
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-3672
10
reference_url https://security.gentoo.org/glsa/202401-02
reference_id GLSA-202401-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T17:09:33Z/
url https://security.gentoo.org/glsa/202401-02
11
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
12
reference_url https://access.redhat.com/errata/RHSA-2021:3280
reference_id RHSA-2021:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3280
13
reference_url https://access.redhat.com/errata/RHSA-2021:3281
reference_id RHSA-2021:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3281
14
reference_url https://access.redhat.com/errata/RHSA-2021:3623
reference_id RHSA-2021:3623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3623
15
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
16
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
17
reference_url https://access.redhat.com/errata/RHSA-2021:3666
reference_id RHSA-2021:3666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3666
18
reference_url https://access.redhat.com/errata/RHSA-2022:2043
reference_id RHSA-2022:2043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2043
19
reference_url https://usn.ubuntu.com/5034-1/
reference_id USN-5034-1
reference_type
scores
url https://usn.ubuntu.com/5034-1/
20
reference_url https://usn.ubuntu.com/5034-2/
reference_id USN-5034-2
reference_type
scores
url https://usn.ubuntu.com/5034-2/
fixed_packages
0
url pkg:apk/alpine/nodejs@14.17.5-r0?arch=x86&distroversion=v3.14&reponame=main
purl pkg:apk/alpine/nodejs@14.17.5-r0?arch=x86&distroversion=v3.14&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.17.5-r0%3Farch=x86&distroversion=v3.14&reponame=main
aliases CVE-2021-3672
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdz-dku3-qqc4
1
url VCID-9g7s-y7nq-xfbb
vulnerability_id VCID-9g7s-y7nq-xfbb
summary Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22939.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22939
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31612
published_at 2026-04-01T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.3165
published_at 2026-04-16T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31653
published_at 2026-04-12T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31617
published_at 2026-04-13T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31744
published_at 2026-04-02T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31788
published_at 2026-04-04T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31607
published_at 2026-04-07T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.3166
published_at 2026-04-08T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31689
published_at 2026-04-09T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31693
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22939
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22939
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1993039
reference_id 1993039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1993039
5
reference_url https://security.archlinux.org/AVG-2283
reference_id AVG-2283
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2283
6
reference_url https://security.gentoo.org/glsa/202401-02
reference_id GLSA-202401-02
reference_type
scores
url https://security.gentoo.org/glsa/202401-02
7
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
8
reference_url https://access.redhat.com/errata/RHSA-2021:3280
reference_id RHSA-2021:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3280
9
reference_url https://access.redhat.com/errata/RHSA-2021:3281
reference_id RHSA-2021:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3281
10
reference_url https://access.redhat.com/errata/RHSA-2021:3623
reference_id RHSA-2021:3623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3623
11
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
12
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
13
reference_url https://access.redhat.com/errata/RHSA-2021:3666
reference_id RHSA-2021:3666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3666
fixed_packages
0
url pkg:apk/alpine/nodejs@14.17.5-r0?arch=x86&distroversion=v3.14&reponame=main
purl pkg:apk/alpine/nodejs@14.17.5-r0?arch=x86&distroversion=v3.14&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.17.5-r0%3Farch=x86&distroversion=v3.14&reponame=main
aliases CVE-2021-22939
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9g7s-y7nq-xfbb
2
url VCID-ap4u-dkwx-1kb3
vulnerability_id VCID-ap4u-dkwx-1kb3
summary Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22931.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22931
reference_id
reference_type
scores
0
value 0.00662
scoring_system epss
scoring_elements 0.71095
published_at 2026-04-01T12:55:00Z
1
value 0.00662
scoring_system epss
scoring_elements 0.71189
published_at 2026-04-16T12:55:00Z
2
value 0.00662
scoring_system epss
scoring_elements 0.71104
published_at 2026-04-02T12:55:00Z
3
value 0.00662
scoring_system epss
scoring_elements 0.71122
published_at 2026-04-04T12:55:00Z
4
value 0.00662
scoring_system epss
scoring_elements 0.71097
published_at 2026-04-07T12:55:00Z
5
value 0.00662
scoring_system epss
scoring_elements 0.71139
published_at 2026-04-08T12:55:00Z
6
value 0.00662
scoring_system epss
scoring_elements 0.71151
published_at 2026-04-09T12:55:00Z
7
value 0.00662
scoring_system epss
scoring_elements 0.71175
published_at 2026-04-11T12:55:00Z
8
value 0.00662
scoring_system epss
scoring_elements 0.7116
published_at 2026-04-12T12:55:00Z
9
value 0.00662
scoring_system epss
scoring_elements 0.71143
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22931
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://hackerone.com/reports/1178337
reference_id 1178337
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/
url https://hackerone.com/reports/1178337
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1993019
reference_id 1993019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1993019
5
reference_url https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/
reference_id aug-2021-security-releases
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/
url https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/
6
reference_url https://security.archlinux.org/AVG-2286
reference_id AVG-2286
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2286
7
reference_url https://security.gentoo.org/glsa/202401-02
reference_id GLSA-202401-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/
url https://security.gentoo.org/glsa/202401-02
8
reference_url https://security.gentoo.org/glsa/202405-29
reference_id GLSA-202405-29
reference_type
scores
url https://security.gentoo.org/glsa/202405-29
9
reference_url https://security.netapp.com/advisory/ntap-20210923-0001/
reference_id ntap-20210923-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/
url https://security.netapp.com/advisory/ntap-20210923-0001/
10
reference_url https://security.netapp.com/advisory/ntap-20211022-0003/
reference_id ntap-20211022-0003
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-01-11T21:01:01Z/
url https://security.netapp.com/advisory/ntap-20211022-0003/
11
reference_url https://access.redhat.com/errata/RHSA-2021:3280
reference_id RHSA-2021:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3280
12
reference_url https://access.redhat.com/errata/RHSA-2021:3281
reference_id RHSA-2021:3281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3281
13
reference_url https://access.redhat.com/errata/RHSA-2021:3623
reference_id RHSA-2021:3623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3623
14
reference_url https://access.redhat.com/errata/RHSA-2021:3638
reference_id RHSA-2021:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3638
15
reference_url https://access.redhat.com/errata/RHSA-2021:3639
reference_id RHSA-2021:3639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3639
16
reference_url https://access.redhat.com/errata/RHSA-2021:3666
reference_id RHSA-2021:3666
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3666
fixed_packages
0
url pkg:apk/alpine/nodejs@14.17.5-r0?arch=x86&distroversion=v3.14&reponame=main
purl pkg:apk/alpine/nodejs@14.17.5-r0?arch=x86&distroversion=v3.14&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.17.5-r0%3Farch=x86&distroversion=v3.14&reponame=main
aliases CVE-2021-22931
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ap4u-dkwx-1kb3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/nodejs@14.17.5-r0%3Farch=x86&distroversion=v3.14&reponame=main