Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-hrem-hhst-97en
Summarydotnet: .NET: Denial of Service via stack overflow
Aliases
0
alias CVE-2026-32203
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el9_7
purl pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet10.0@10.0.106-1%3Farch=el9_7
1
url pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el10_1
purl pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el10_1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet10.0@10.0.106-1%3Farch=el10_1
2
url pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el8_10
purl pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet10.0@10.0.106-1%3Farch=el8_10
3
url pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el9_7
purl pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el9_7
4
url pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el8_10
purl pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el8_10
5
url pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el10_1
purl pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el10_1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el10_1
6
url pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el8_10
purl pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el8_10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el8_10
7
url pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el9_7
purl pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el9_7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el9_7
8
url pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el10_1
purl pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el10_1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cc3y-8y5n-v7cq
1
vulnerability VCID-hrem-hhst-97en
2
vulnerability VCID-kd36-kt84-1fcz
3
vulnerability VCID-u6eh-1bec-n7c2
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el10_1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32203.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32203.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32203
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30702
published_at 2026-04-21T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34043
published_at 2026-04-16T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34031
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32203
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457740
reference_id 2457740
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457740
3
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32203
reference_id CVE-2026-32203
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T10:41:37Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32203
4
reference_url https://access.redhat.com/errata/RHSA-2026:8467
reference_id RHSA-2026:8467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8467
5
reference_url https://access.redhat.com/errata/RHSA-2026:8468
reference_id RHSA-2026:8468
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8468
6
reference_url https://access.redhat.com/errata/RHSA-2026:8469
reference_id RHSA-2026:8469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8469
7
reference_url https://access.redhat.com/errata/RHSA-2026:8470
reference_id RHSA-2026:8470
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8470
8
reference_url https://access.redhat.com/errata/RHSA-2026:8471
reference_id RHSA-2026:8471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8471
9
reference_url https://access.redhat.com/errata/RHSA-2026:8472
reference_id RHSA-2026:8472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8472
10
reference_url https://access.redhat.com/errata/RHSA-2026:8473
reference_id RHSA-2026:8473
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8473
11
reference_url https://access.redhat.com/errata/RHSA-2026:8474
reference_id RHSA-2026:8474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8474
12
reference_url https://access.redhat.com/errata/RHSA-2026:8475
reference_id RHSA-2026:8475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8475
13
reference_url https://usn.ubuntu.com/8176-1/
reference_id USN-8176-1
reference_type
scores
url https://usn.ubuntu.com/8176-1/
Weaknesses
0
cwe_id 787
name Out-of-bounds Write
description The product writes data past the end, or before the beginning, of the intended buffer.
1
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
2
cwe_id 121
name Stack-based Buffer Overflow
description A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Exploits
Severity_range_score7.5 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-hrem-hhst-97en