{"url":"http://public2.vulnerablecode.io/api/packages/994815?format=json","purl":"pkg:deb/debian/npm@9.2.0~ds1-1","type":"deb","namespace":"debian","name":"npm","version":"9.2.0~ds1-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11556?format=json","vulnerability_id":"VCID-368z-yjtu-m3hc","summary":"Insufficient Verification of Data Authenticity\nThis CVE has been marked as a False Positive as it only concerns the npm cli tool.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43616.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43616","reference_id":"","reference_type":"","scores":[{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.82937","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.8308","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.83065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.83073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.82953","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.82965","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.82963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.82987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.82995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.83011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.83004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.83","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.83039","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01851","scoring_system":"epss","scoring_elements":"0.83042","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43616"},{"reference_url":"https://docs.npmjs.com/cli/v7/commands/npm-ci","reference_id":"","reference_type":"","scores":[],"url":"https://docs.npmjs.com/cli/v7/commands/npm-ci"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/npm/cli/issues/2701","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/npm/cli/issues/2701"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050282","reference_id":"2050282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2050282"},{"reference_url":"https://security.archlinux.org/AVG-2554","reference_id":"AVG-2554","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2554"},{"reference_url":"https://github.com/icatalina/CVE-2021-43616","reference_id":"CVE-2021-43616","reference_type":"","scores":[],"url":"https://github.com/icatalina/CVE-2021-43616"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43616","reference_id":"CVE-2021-43616","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4796","reference_id":"RHSA-2022:4796","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4796"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994815?format=json","purl":"pkg:deb/debian/npm@9.2.0~ds1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/npm@9.2.0~ds1-1"}],"aliases":["CVE-2021-43616"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-368z-yjtu-m3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11152?format=json","vulnerability_id":"VCID-9vk1-2ysq-3ygd","summary":"UNIX Symbolic Link (Symlink) Following\n`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is accomplished by extracting package contents into a project's `node_modules` folder. If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system. Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.) An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe. This is patched in @npmcli/arborist which is included in npm v7.20.7. For more information including workarounds please see the referenced GHSA-gmw6-94gg-2rc2.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39135.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39135.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39135","reference_id":"","reference_type":"","scores":[{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43407","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4349","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43486","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43617","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43571","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43584","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43599","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43555","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43621","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43631","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43507","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39135"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39135"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/npm/arborist","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/npm/arborist"},{"reference_url":"https://www.npmjs.com/package/@npmcli/arborist","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.npmjs.com/package/@npmcli/arborist"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2021.html","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999745","reference_id":"1999745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999745"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993405","reference_id":"993405","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993405"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-39135","reference_id":"CVE-2021-39135","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-39135"},{"reference_url":"https://github.com/advisories/GHSA-gmw6-94gg-2rc2","reference_id":"GHSA-gmw6-94gg-2rc2","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-gmw6-94gg-2rc2"},{"reference_url":"https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2","reference_id":"GHSA-gmw6-94gg-2rc2","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2"},{"reference_url":"https://security.gentoo.org/glsa/202405-29","reference_id":"GLSA-202405-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-29"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994815?format=json","purl":"pkg:deb/debian/npm@9.2.0~ds1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/npm@9.2.0~ds1-1"}],"aliases":["CVE-2021-39135","GHSA-gmw6-94gg-2rc2"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9vk1-2ysq-3ygd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11151?format=json","vulnerability_id":"VCID-myru-vzn7-u7cf","summary":"UNIX Symbolic Link (Symlink) Following\n`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39134.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39134.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39134","reference_id":"","reference_type":"","scores":[{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.7246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72433","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72391","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.7252","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72514","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72386","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-39134"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39134"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/npm/arborist","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/npm/arborist"},{"reference_url":"https://www.npmjs.com/package/@npmcli/arborist","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.npmjs.com/package/@npmcli/arborist"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2021.html","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999744","reference_id":"1999744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1999744"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993407","reference_id":"993407","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993407"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-39134","reference_id":"CVE-2021-39134","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-39134"},{"reference_url":"https://github.com/advisories/GHSA-2h3h-q99f-3fhc","reference_id":"GHSA-2h3h-q99f-3fhc","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2h3h-q99f-3fhc"},{"reference_url":"https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc","reference_id":"GHSA-2h3h-q99f-3fhc","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc"},{"reference_url":"https://security.gentoo.org/glsa/202405-29","reference_id":"GLSA-202405-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-29"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994815?format=json","purl":"pkg:deb/debian/npm@9.2.0~ds1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/npm@9.2.0~ds1-1"}],"aliases":["CVE-2021-39134","GHSA-2h3h-q99f-3fhc"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-myru-vzn7-u7cf"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/npm@9.2.0~ds1-1"}