Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-4wx3-ary7-2be6
SummaryParsing a malicious font file can cause excessive memory allocation.
Aliases
0
alias CVE-2026-33812
Fixed_packages
0
url pkg:deb/debian/golang-golang-x-image@0.32.0-1
purl pkg:deb/debian/golang-golang-x-image@0.32.0-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.32.0-1
1
url pkg:deb/debian/golang-golang-x-image@0.39.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.39.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.39.0-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1
purl pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-x59b-qzje-7qf9
6
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1
1
url pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-x59b-qzje-7qf9
6
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.0~git20200119.58c2397-1%3Fdistro=trixie
2
url pkg:deb/debian/golang-golang-x-image@0.5.0-1
purl pkg:deb/debian/golang-golang-x-image@0.5.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.5.0-1
3
url pkg:deb/debian/golang-golang-x-image@0.5.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.5.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2uqz-va31-ubhz
1
vulnerability VCID-4wx3-ary7-2be6
2
vulnerability VCID-6vp5-c27t-zkhh
3
vulnerability VCID-fj7w-564m-yuca
4
vulnerability VCID-h16m-x9wr-7yem
5
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.5.0-1%3Fdistro=trixie
4
url pkg:deb/debian/golang-golang-x-image@0.18.0-1
purl pkg:deb/debian/golang-golang-x-image@0.18.0-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4wx3-ary7-2be6
1
vulnerability VCID-6vp5-c27t-zkhh
2
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.18.0-1
5
url pkg:deb/debian/golang-golang-x-image@0.18.0-1?distro=trixie
purl pkg:deb/debian/golang-golang-x-image@0.18.0-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4wx3-ary7-2be6
1
vulnerability VCID-6vp5-c27t-zkhh
2
vulnerability VCID-yj5c-4wbb-gbcx
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-golang-x-image@0.18.0-1%3Fdistro=trixie
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33812.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-33812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-33812
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01686
published_at 2026-04-24T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01682
published_at 2026-04-26T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.02016
published_at 2026-05-07T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02077
published_at 2026-04-29T12:55:00Z
4
value 0.00013
scoring_system epss
scoring_elements 0.02025
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-33812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33812
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2460227
reference_id 2460227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2460227
4
reference_url https://go.dev/cl/761180
reference_id 761180
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T20:43:08Z/
url https://go.dev/cl/761180
5
reference_url https://go.dev/issue/78382
reference_id 78382
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T20:43:08Z/
url https://go.dev/issue/78382
6
reference_url https://pkg.go.dev/vuln/GO-2026-4962
reference_id GO-2026-4962
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-21T20:43:08Z/
url https://pkg.go.dev/vuln/GO-2026-4962
Weaknesses
0
cwe_id 789
name Memory Allocation with Excessive Size Value
description The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.
1
cwe_id 770
name Allocation of Resources Without Limits or Throttling
description The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Exploits
Severity_range_score6.1 - 6.1
Exploitability0.5
Weighted_severity5.5
Risk_score2.8
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-4wx3-ary7-2be6