Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/98400?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/98400?format=api", "purl": "pkg:rpm/redhat/ovirt-web-ui@1.9.0-1?arch=el8ev", "type": "rpm", "namespace": "redhat", "name": "ovirt-web-ui", "version": "1.9.0-1", "qualifiers": { "arch": "el8ev" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11245?format=api", "vulnerability_id": "VCID-c86y-234c-s3hu", "summary": "ansi-regex is vulnerable to Inefficient Regular Expression Complexity", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3807.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3807.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3807", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43851", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43777", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43899", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43984", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43981", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.4403", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44105", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44043", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44059", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44076", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44074", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44023", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44092", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44069", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44021", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3807" }, { "reference_url": "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/chalk/ansi-regex", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex" }, { "reference_url": "https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex/commit/419250fa510bf31b4cc672e76537a64f9332e1f1" }, { "reference_url": "https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex/commit/75a657da7af875b2e2724fd6331bf0a4b23d3c9a" }, { "reference_url": "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9" }, { "reference_url": "https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex/commit/c3c0b3f2736b9c01feec0fef33980c43720dcde8" }, { "reference_url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311" }, { "reference_url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774" }, { "reference_url": "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/chalk/ansi-regex/releases/tag/v6.0.1" }, { "reference_url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221014-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20221014-0002" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221014-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20221014-0002/" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007557", "reference_id": "2007557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007557" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994568", "reference_id": "994568", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994568" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", "reference_id": "CVE-2021-3807", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" }, { "reference_url": "https://github.com/advisories/GHSA-93q8-gq69-wqmw", "reference_id": "GHSA-93q8-gq69-wqmw", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-93q8-gq69-wqmw" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5171", "reference_id": "RHSA-2021:5171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0041", "reference_id": "RHSA-2022:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0246", "reference_id": "RHSA-2022:0246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0350", "reference_id": "RHSA-2022:0350", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0350" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4711", "reference_id": "RHSA-2022:4711", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4711" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4814", "reference_id": "RHSA-2022:4814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4814" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5483", "reference_id": "RHSA-2022:5483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5532", "reference_id": "RHSA-2022:5532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5555", "reference_id": "RHSA-2022:5555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5555" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6449", "reference_id": "RHSA-2022:6449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6595", "reference_id": "RHSA-2022:6595", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6595" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3742", "reference_id": "RHSA-2023:3742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3742" } ], "fixed_packages": [], "aliases": [ "CVE-2021-3807", "GHSA-93q8-gq69-wqmw" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c86y-234c-s3hu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54256?format=api", "vulnerability_id": "VCID-eg6c-bq3z-4qcn", "summary": "Exposure of Sensitive Information to an Unauthorized Actor in semantic-release\n### Impact\n_What kind of vulnerability is it? Who is impacted?_\n\nSecrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by [encodeURI](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI). Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials.\n\n### Patches\n_Has the problem been patched? What versions should users upgrade to?_\n\nFixed in 19.0.3\n\n### Workarounds\n_Is there a way for users to fix or remediate the vulnerability without upgrading?_\n\nSecrets that do not contain characters that are excluded from encoding with `encodeURI` when included in a URL are already masked properly.\n\n### References\n_Are there any links users can visit to find out more?_\n* https://github.com/semantic-release/semantic-release/releases/tag/v19.0.3\n* https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open a discussion in [semantic-release discussions](https://github.com/semantic-release/semantic-release/discussions)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31051.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31051.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31051", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73373", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.7322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73214", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73251", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73264", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73269", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73305", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73313", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73341", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73353", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73351", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73347", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31051" }, { "reference_url": "https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:40Z/" } ], "url": "https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI" }, { "reference_url": "https://github.com/semantic-release/semantic-release", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/semantic-release/semantic-release" }, { "reference_url": "https://github.com/semantic-release/semantic-release/commit/58a226f29c04ee56bbb02cc661f020d568849cad", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:40Z/" } ], "url": "https://github.com/semantic-release/semantic-release/commit/58a226f29c04ee56bbb02cc661f020d568849cad" }, { "reference_url": "https://github.com/semantic-release/semantic-release/pull/2449", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/semantic-release/semantic-release/pull/2449" }, { "reference_url": "https://github.com/semantic-release/semantic-release/pull/2459", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/semantic-release/semantic-release/pull/2459" }, { "reference_url": "https://github.com/semantic-release/semantic-release/releases/tag/v19.0.3", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:40Z/" } ], "url": "https://github.com/semantic-release/semantic-release/releases/tag/v19.0.3" }, { "reference_url": "https://github.com/semantic-release/semantic-release/security/advisories/GHSA-x2pg-mjhr-2m5x", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:05:40Z/" } ], "url": "https://github.com/semantic-release/semantic-release/security/advisories/GHSA-x2pg-mjhr-2m5x" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31051", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31051" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097414", "reference_id": "2097414", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097414" }, { "reference_url": "https://github.com/advisories/GHSA-x2pg-mjhr-2m5x", "reference_id": "GHSA-x2pg-mjhr-2m5x", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-x2pg-mjhr-2m5x" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5555", "reference_id": "RHSA-2022:5555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5555" } ], "fixed_packages": [], "aliases": [ "CVE-2022-31051", "GHSA-x2pg-mjhr-2m5x" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eg6c-bq3z-4qcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43723?format=api", "vulnerability_id": "VCID-q2nz-yft3-bqb2", "summary": "Uncontrolled Resource Consumption in trim-newlines\n@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the `.end()` method.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01497", "scoring_system": "epss", "scoring_elements": "0.81081", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01497", "scoring_system": "epss", "scoring_elements": "0.81057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01497", "scoring_system": "epss", "scoring_elements": "0.81048", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84799", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84661", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84683", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.8469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84704", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84719", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.8472", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84721", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84748", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84758", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84757", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02286", "scoring_system": "epss", "scoring_elements": "0.84773", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-33623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33623" }, { "reference_url": "https://github.com/sindresorhus/trim-newlines", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/sindresorhus/trim-newlines" }, { "reference_url": "https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91" }, { "reference_url": "https://github.com/sindresorhus/trim-newlines/commit/b10d5f4afef832b16bc56d49fc52c68cbd403869", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/sindresorhus/trim-newlines/commit/b10d5f4afef832b16bc56d49fc52c68cbd403869" }, { "reference_url": "https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00033.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00033.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33623" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210702-0007", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210702-0007" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210702-0007/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210702-0007/" }, { "reference_url": "https://www.npmjs.com/package/trim-newlines", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.npmjs.com/package/trim-newlines" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615", "reference_id": "1966615", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966615" }, { "reference_url": "https://github.com/advisories/GHSA-7p7h-4mm5-852v", "reference_id": "GHSA-7p7h-4mm5-852v", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-7p7h-4mm5-852v" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5555", "reference_id": "RHSA-2022:5555", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5555" }, { "reference_url": "https://usn.ubuntu.com/5999-1/", "reference_id": "USN-5999-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5999-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-33623", "GHSA-7p7h-4mm5-852v" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q2nz-yft3-bqb2" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ovirt-web-ui@1.9.0-1%3Farch=el8ev" }