Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-yj5c-4wbb-gbcx
Summary
Go Images vulnerable to an out-of-memory error via a crafted TIFF file
A maliciously crafted TIFF file can cause image decoding to attempt to allocate up 4GiB of memory, causing either excessive resource consumption or an out-of-memory error.
Aliases
0
alias CVE-2026-33809
1
alias GHSA-44p7-9xx4-hf2g
Fixed_packages
0
url pkg:apk/alpine/rclone@1.73.5-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=armhf&distroversion=edge&reponame=community
1
url pkg:apk/alpine/rclone@1.73.5-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=armv7&distroversion=edge&reponame=community
2
url pkg:apk/alpine/rclone@1.73.5-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=loongarch64&distroversion=edge&reponame=community
3
url pkg:apk/alpine/rclone@1.73.5-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=ppc64le&distroversion=edge&reponame=community
4
url pkg:apk/alpine/rclone@1.73.5-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=x86&distroversion=edge&reponame=community
5
url pkg:apk/alpine/rclone@1.73.5-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=x86_64&distroversion=edge&reponame=community
6
url pkg:apk/alpine/rclone@1.73.5-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=aarch64&distroversion=edge&reponame=community
7
url pkg:apk/alpine/rclone@1.73.5-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=s390x&distroversion=edge&reponame=community
8
url pkg:apk/alpine/rclone@1.73.5-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.73.5-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.73.5-r0%3Farch=riscv64&distroversion=edge&reponame=community
9
url pkg:deb/debian/golang-golang-x-image@0.32.0-1
purl pkg:deb/debian/golang-golang-x-image@0.32.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.32.0-1
10
url pkg:deb/debian/golang-golang-x-image@0.38.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.38.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.38.0-1%3Fdistro=trixie
11
url pkg:deb/debian/golang-golang-x-image@0.39.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.39.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.39.0-1%3Fdistro=trixie
12
url pkg:golang/golang.org/x/image@0.38.0
purl pkg:golang/golang.org/x/image@0.38.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/golang.org/x/image@0.38.0
Affected_packages
0
url pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1
purl pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-x59b-qzje-7qf9
6
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1
1
url pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-x59b-qzje-7qf9
6
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1%3Fdistro=trixie
2
url pkg:deb/debian/golang-golang-x-image@0.5.0-1
purl pkg:deb/debian/golang-golang-x-image@0.5.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.5.0-1
3
url pkg:deb/debian/golang-golang-x-image@0.5.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.5.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.5.0-1%3Fdistro=trixie
4
url pkg:deb/debian/golang-golang-x-image@0.18.0-1
purl pkg:deb/debian/golang-golang-x-image@0.18.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4wx3-ary7-2be6
1
vulnerability VCID-6vp5-c27t-zkhh
2
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.18.0-1
5
url pkg:deb/debian/golang-golang-x-image@0.18.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.18.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4wx3-ary7-2be6
1
vulnerability VCID-6vp5-c27t-zkhh
2
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.18.0-1%3Fdistro=trixie
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33809.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33809
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01533
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01891
published_at 2026-05-05T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01909
published_at 2026-04-26T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01594
published_at 2026-04-21T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01944
published_at 2026-04-29T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01878
published_at 2026-05-07T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10663
published_at 2026-04-04T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10602
published_at 2026-04-02T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10527
published_at 2026-04-07T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.106
published_at 2026-04-08T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.1066
published_at 2026-04-09T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10673
published_at 2026-04-11T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10641
published_at 2026-04-12T12:55:00Z
13
value 0.00036
scoring_system epss
scoring_elements 0.10616
published_at 2026-04-13T12:55:00Z
14
value 0.00036
scoring_system epss
scoring_elements 0.10483
published_at 2026-04-16T12:55:00Z
15
value 0.00036
scoring_system epss
scoring_elements 0.10501
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33809
2
reference_url https://cs.opensource.google/go/x/image
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cs.opensource.google/go/x/image
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33809
4
reference_url https://go.dev/cl/757660
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T20:05:32Z/
url https://go.dev/cl/757660
5
reference_url https://go.dev/issue/78267
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T20:05:32Z/
url https://go.dev/issue/78267
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-33809
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-33809
7
reference_url https://pkg.go.dev/vuln/GO-2026-4815
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T20:05:32Z/
url https://pkg.go.dev/vuln/GO-2026-4815
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451437
reference_id 2451437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2451437
Weaknesses
0
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
1
cwe_id 1285
name Improper Validation of Specified Index, Position, or Offset in Input
description The product receives input that is expected to specify an index, position, or offset into an indexable resource such as a buffer or file, but it does not validate or incorrectly validates that the specified index/position/offset has the required properties.
2
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
3
cwe_id 434
name Unrestricted Upload of File with Dangerous Type
description The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-yj5c-4wbb-gbcx