Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jbws-qjq3-qbhq
Summarynodejs: Nodejs network segmentation bypass
Aliases
0
alias CVE-2026-21636
Fixed_packages
0
url pkg:deb/debian/nodejs@0?distro=trixie
purl pkg:deb/debian/nodejs@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@0%3Fdistro=trixie
1
url pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4?distro=trixie
purl pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vp3-fzdr-yqbm
1
vulnerability VCID-2t7c-dju9-pff6
2
vulnerability VCID-38k9-23j3-eqh7
3
vulnerability VCID-43sf-4r41-wugc
4
vulnerability VCID-96yh-1wub-zucg
5
vulnerability VCID-98fy-tedc-ube7
6
vulnerability VCID-bjza-25hu-vkad
7
vulnerability VCID-dgkh-jdah-wfh9
8
vulnerability VCID-dt7u-3usg-9uet
9
vulnerability VCID-kj75-vmwa-gqgq
10
vulnerability VCID-sag8-repb-g3f4
11
vulnerability VCID-twc8-ewm7-wkb1
12
vulnerability VCID-u8bq-8jp4-jkem
13
vulnerability VCID-v7uy-445x-tuan
14
vulnerability VCID-x1an-pjq4-nbby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@12.22.12~dfsg-1~deb11u4%3Fdistro=trixie
2
url pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1?distro=trixie
purl pkg:deb/debian/nodejs@18.20.4%2Bdfsg-1~deb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vp3-fzdr-yqbm
1
vulnerability VCID-2t7c-dju9-pff6
2
vulnerability VCID-43sf-4r41-wugc
3
vulnerability VCID-96yh-1wub-zucg
4
vulnerability VCID-98fy-tedc-ube7
5
vulnerability VCID-bjza-25hu-vkad
6
vulnerability VCID-dgkh-jdah-wfh9
7
vulnerability VCID-dt7u-3usg-9uet
8
vulnerability VCID-twc8-ewm7-wkb1
9
vulnerability VCID-u8bq-8jp4-jkem
10
vulnerability VCID-v7uy-445x-tuan
11
vulnerability VCID-wf5t-3pwz-c7d7
12
vulnerability VCID-x1an-pjq4-nbby
13
vulnerability VCID-xkpz-pb5y-jqcy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@18.20.4%252Bdfsg-1~deb12u1%3Fdistro=trixie
3
url pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/nodejs@20.19.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@20.19.2%252Bdfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-1?distro=trixie
purl pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@22.22.2%252Bdfsg%252B~cs22.19.15-1%3Fdistro=trixie
5
url pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-3?distro=trixie
purl pkg:deb/debian/nodejs@22.22.2%2Bdfsg%2B~cs22.19.15-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/nodejs@22.22.2%252Bdfsg%252B~cs22.19.15-3%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21636.json
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-21636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-21636
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06241
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06264
published_at 2026-04-16T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0633
published_at 2026-04-11T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06324
published_at 2026-04-12T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06313
published_at 2026-04-13T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06272
published_at 2026-04-04T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06251
published_at 2026-04-07T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06297
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06338
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-21636
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2431342
reference_id 2431342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2431342
4
reference_url https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
reference_id december-2025-security-releases
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-21T18:38:13Z/
url https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
Weaknesses
0
cwe_id 281
name Improper Preservation of Permissions
description The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
Exploits
Severity_range_score5.8 - 8.1
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jbws-qjq3-qbhq