Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-vg7c-pctm-m7gn
Summary
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
Aliases
0
alias CVE-2021-33502
1
alias GHSA-px4h-xg32-q955
Fixed_packages
0
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%3Fdistro=trixie
1
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%252Bdeb11u1
2
url pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/node-got@11.8.1%2B~cs53.13.17-3%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.1%252B~cs53.13.17-3%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-3%3Fdistro=trixie
4
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-5%3Fdistro=trixie
5
url pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
purl pkg:deb/debian/node-got@11.8.5%2B~cs58.13.36-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@11.8.5%252B~cs58.13.36-6%3Fdistro=trixie
6
url pkg:npm/normalize-url@4.5.1
purl pkg:npm/normalize-url@4.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@4.5.1
7
url pkg:npm/normalize-url@5.3.1
purl pkg:npm/normalize-url@5.3.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@5.3.1
8
url pkg:npm/normalize-url@6.0.1
purl pkg:npm/normalize-url@6.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@6.0.1
Affected_packages
0
url pkg:deb/debian/node-got@7.1.0-1
purl pkg:deb/debian/node-got@7.1.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg3f-8mjh-bbf5
1
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-got@7.1.0-1
1
url pkg:npm/normalize-url@4.3.0
purl pkg:npm/normalize-url@4.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@4.3.0
2
url pkg:npm/normalize-url@4.4.0
purl pkg:npm/normalize-url@4.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@4.4.0
3
url pkg:npm/normalize-url@4.4.1
purl pkg:npm/normalize-url@4.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@4.4.1
4
url pkg:npm/normalize-url@4.5.0
purl pkg:npm/normalize-url@4.5.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@4.5.0
5
url pkg:npm/normalize-url@5.0.0
purl pkg:npm/normalize-url@5.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@5.0.0
6
url pkg:npm/normalize-url@5.1.0
purl pkg:npm/normalize-url@5.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@5.1.0
7
url pkg:npm/normalize-url@5.2.0
purl pkg:npm/normalize-url@5.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@5.2.0
8
url pkg:npm/normalize-url@5.2.1
purl pkg:npm/normalize-url@5.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@5.2.1
9
url pkg:npm/normalize-url@5.3.0
purl pkg:npm/normalize-url@5.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@5.3.0
10
url pkg:npm/normalize-url@6.0.0
purl pkg:npm/normalize-url@6.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:npm/normalize-url@6.0.0
11
url pkg:rpm/redhat/nodejs-nodemon@2.0.19-1?arch=el9_0
purl pkg:rpm/redhat/nodejs-nodemon@2.0.19-1?arch=el9_0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4f1w-xpyy-2fcf
1
vulnerability VCID-7tyw-ppyt-zqgr
2
vulnerability VCID-c86y-234c-s3hu
3
vulnerability VCID-vg3f-8mjh-bbf5
4
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs-nodemon@2.0.19-1%3Farch=el9_0
12
url pkg:rpm/redhat/ovirt-engine-ui-extensions@1.3.3-1?arch=el8ev
purl pkg:rpm/redhat/ovirt-engine-ui-extensions@1.3.3-1?arch=el8ev
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-c86y-234c-s3hu
1
vulnerability VCID-qat2-2h6v-rfae
2
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ovirt-engine-ui-extensions@1.3.3-1%3Farch=el8ev
13
url pkg:rpm/redhat/ovirt-web-ui@1.8.1-2?arch=el8ev
purl pkg:rpm/redhat/ovirt-web-ui@1.8.1-2?arch=el8ev
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-vg7c-pctm-m7gn
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ovirt-web-ui@1.8.1-2%3Farch=el8ev
14
url pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.2-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.2-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs@12.22.2-1%3Farch=el7
15
url pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-2?arch=el7
purl pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs12-nodejs-nodemon@2.0.3-2%3Farch=el7
16
url pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.2-1?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.2-1?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs@14.17.2-1%3Farch=el7
17
url pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-2?arch=el7
purl pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-2?arch=el7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4kjh-zmaz-tqb7
1
vulnerability VCID-nj6f-gujk-wqah
2
vulnerability VCID-vg7c-pctm-m7gn
3
vulnerability VCID-w93e-wkm9-kuex
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-nodejs14-nodejs-nodemon@2.0.3-2%3Farch=el7
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-33502
reference_id
reference_type
scores
0
value 0.00355
scoring_system epss
scoring_elements 0.57791
published_at 2026-05-11T12:55:00Z
1
value 0.00355
scoring_system epss
scoring_elements 0.57844
published_at 2026-05-09T12:55:00Z
2
value 0.00355
scoring_system epss
scoring_elements 0.57819
published_at 2026-05-12T12:55:00Z
3
value 0.00355
scoring_system epss
scoring_elements 0.57737
published_at 2026-05-05T12:55:00Z
4
value 0.00355
scoring_system epss
scoring_elements 0.57781
published_at 2026-05-07T12:55:00Z
5
value 0.00355
scoring_system epss
scoring_elements 0.57801
published_at 2026-04-26T12:55:00Z
6
value 0.00355
scoring_system epss
scoring_elements 0.57782
published_at 2026-04-24T12:55:00Z
7
value 0.00355
scoring_system epss
scoring_elements 0.57824
published_at 2026-04-21T12:55:00Z
8
value 0.00355
scoring_system epss
scoring_elements 0.57847
published_at 2026-04-18T12:55:00Z
9
value 0.00355
scoring_system epss
scoring_elements 0.57848
published_at 2026-04-16T12:55:00Z
10
value 0.00355
scoring_system epss
scoring_elements 0.57886
published_at 2026-05-14T12:55:00Z
11
value 0.00464
scoring_system epss
scoring_elements 0.64273
published_at 2026-04-07T12:55:00Z
12
value 0.00464
scoring_system epss
scoring_elements 0.6423
published_at 2026-04-01T12:55:00Z
13
value 0.00464
scoring_system epss
scoring_elements 0.64288
published_at 2026-04-02T12:55:00Z
14
value 0.00464
scoring_system epss
scoring_elements 0.64316
published_at 2026-04-04T12:55:00Z
15
value 0.00464
scoring_system epss
scoring_elements 0.64322
published_at 2026-04-08T12:55:00Z
16
value 0.00464
scoring_system epss
scoring_elements 0.64336
published_at 2026-04-09T12:55:00Z
17
value 0.00464
scoring_system epss
scoring_elements 0.64349
published_at 2026-04-11T12:55:00Z
18
value 0.00464
scoring_system epss
scoring_elements 0.64338
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-33502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
3
reference_url https://github.com/sindresorhus/normalize-url
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url
4
reference_url https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103
5
reference_url https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-33502
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-33502
7
reference_url https://security.netapp.com/advisory/ntap-20210706-0001
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210706-0001
8
reference_url https://security.netapp.com/advisory/ntap-20210706-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210706-0001/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964461
reference_id 1964461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964461
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989258
reference_id 989258
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989258
11
reference_url https://github.com/advisories/GHSA-px4h-xg32-q955
reference_id GHSA-px4h-xg32-q955
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-px4h-xg32-q955
12
reference_url https://access.redhat.com/errata/RHSA-2021:2931
reference_id RHSA-2021:2931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2931
13
reference_url https://access.redhat.com/errata/RHSA-2021:2932
reference_id RHSA-2021:2932
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2932
14
reference_url https://access.redhat.com/errata/RHSA-2021:5171
reference_id RHSA-2021:5171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5171
15
reference_url https://access.redhat.com/errata/RHSA-2022:0246
reference_id RHSA-2022:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0246
16
reference_url https://access.redhat.com/errata/RHSA-2022:0350
reference_id RHSA-2022:0350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0350
17
reference_url https://access.redhat.com/errata/RHSA-2022:4711
reference_id RHSA-2022:4711
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4711
18
reference_url https://access.redhat.com/errata/RHSA-2022:6595
reference_id RHSA-2022:6595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6595
Weaknesses
0
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
1
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
2
cwe_id 1333
name Inefficient Regular Expression Complexity
description The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score7.0 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-vg7c-pctm-m7gn