Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-65yu-seks-x7bz
Summary
Aliases
0
alias CVE-2026-32952
1
alias GHSA-pjcq-xvwq-hhpj
Fixed_packages
0
url pkg:apk/alpine/rclone@1.74.0-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=armhf&distroversion=edge&reponame=community
1
url pkg:apk/alpine/rclone@1.74.0-r0?arch=armv7&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=armv7&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=armv7&distroversion=edge&reponame=community
2
url pkg:apk/alpine/rclone@1.74.0-r0?arch=loongarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=loongarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=loongarch64&distroversion=edge&reponame=community
3
url pkg:apk/alpine/rclone@1.74.0-r0?arch=ppc64le&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=ppc64le&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=ppc64le&distroversion=edge&reponame=community
4
url pkg:apk/alpine/rclone@1.74.0-r0?arch=s390x&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=s390x&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=s390x&distroversion=edge&reponame=community
5
url pkg:apk/alpine/rclone@1.74.0-r0?arch=x86_64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=x86_64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=x86_64&distroversion=edge&reponame=community
6
url pkg:apk/alpine/rclone@1.74.0-r0?arch=aarch64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=aarch64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=aarch64&distroversion=edge&reponame=community
7
url pkg:apk/alpine/rclone@1.74.0-r0?arch=riscv64&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=riscv64&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=riscv64&distroversion=edge&reponame=community
8
url pkg:apk/alpine/rclone@1.74.0-r0?arch=x86&distroversion=edge&reponame=community
purl pkg:apk/alpine/rclone@1.74.0-r0?arch=x86&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/rclone@1.74.0-r0%3Farch=x86&distroversion=edge&reponame=community
9
url pkg:golang/github.com/Azure/go-ntlmssp@0.1.1
purl pkg:golang/github.com/Azure/go-ntlmssp@0.1.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/Azure/go-ntlmssp@0.1.1
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32952.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-32952
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17803
published_at 2026-04-26T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17825
published_at 2026-04-24T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17768
published_at 2026-04-29T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20826
published_at 2026-05-07T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20752
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-32952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32952
3
reference_url https://github.com/Azure/go-ntlmssp
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Azure/go-ntlmssp
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-32952
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-32952
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135345
reference_id 1135345
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135345
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2461375
reference_id 2461375
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2461375
7
reference_url https://github.com/Azure/go-ntlmssp/security/advisories/GHSA-pjcq-xvwq-hhpj
reference_id GHSA-pjcq-xvwq-hhpj
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-24T16:29:17Z/
url https://github.com/Azure/go-ntlmssp/security/advisories/GHSA-pjcq-xvwq-hhpj
8
reference_url https://github.com/Azure/go-ntlmssp/releases/tag/v0.1.1
reference_id v0.1.1
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-24T16:29:17Z/
url https://github.com/Azure/go-ntlmssp/releases/tag/v0.1.1
Weaknesses
0
cwe_id 190
name Integer Overflow or Wraparound
description The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Exploits
Severity_range_score4.0 - 6.9
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-65yu-seks-x7bz