Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/352171?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/352171?format=api", "vulnerability_id": "VCID-hrem-hhst-97en", "summary": "dotnet: .NET: Denial of Service via stack overflow", "aliases": [ { "alias": "CVE-2026-32203" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1068146?format=api", "purl": "pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el8_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet10.0@10.0.106-1%3Farch=el8_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068143?format=api", "purl": "pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet10.0@10.0.106-1%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068140?format=api", "purl": "pkg:rpm/redhat/dotnet10.0@10.0.106-1?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet10.0@10.0.106-1%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076538?format=api", "purl": "pkg:rpm/redhat/dotnet10-0-main@10.0.106-1?arch=hum1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-cq8d-59u6-2bc5" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet10-0-main@10.0.106-1%3Farch=hum1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089469?format=api", "purl": "pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068139?format=api", "purl": "pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068141?format=api", "purl": "pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el8_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el8_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089467?format=api", "purl": "pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068147?format=api", "purl": "pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089496?format=api", "purl": "pkg:rpm/redhat/dotnet8.0@8.0.126-1?arch=el9_4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8.0@8.0.126-1%3Farch=el9_4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076539?format=api", "purl": "pkg:rpm/redhat/dotnet8-0-main@8.0.126-1?arch=hum1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4zux-cmaa-w3gd" }, { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-cju3-5hjk-h3d3" }, { "vulnerability": "VCID-hrdk-wnbt-cyes" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-k3fx-jcj4-jfc6" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet8-0-main@8.0.126-1%3Farch=hum1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068145?format=api", "purl": "pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el10_1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el10_1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068144?format=api", "purl": "pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el9_7", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el9_7" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089470?format=api", "purl": "pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el10_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el10_0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1089468?format=api", "purl": "pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el9_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el9_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1068142?format=api", "purl": "pkg:rpm/redhat/dotnet9.0@9.0.116-1?arch=el8_10", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9.0@9.0.116-1%3Farch=el8_10" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076540?format=api", "purl": "pkg:rpm/redhat/dotnet9-0-main@9.0.116-1?arch=hum1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4zux-cmaa-w3gd" }, { "vulnerability": "VCID-cc3y-8y5n-v7cq" }, { "vulnerability": "VCID-cju3-5hjk-h3d3" }, { "vulnerability": "VCID-hrdk-wnbt-cyes" }, { "vulnerability": "VCID-hrem-hhst-97en" }, { "vulnerability": "VCID-k3fx-jcj4-jfc6" }, { "vulnerability": "VCID-kd36-kt84-1fcz" }, { "vulnerability": "VCID-u6eh-1bec-n7c2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/dotnet9-0-main@9.0.116-1%3Farch=hum1" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32203.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-32203.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-32203", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30339", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30538", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30421", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.302", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34031", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45846", "published_at": "2026-05-15T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45769", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45788", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.4573", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45829", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45756", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-32203" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457740", "reference_id": "2457740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2457740" }, { "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32203", "reference_id": "CVE-2026-32203", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T10:41:37Z/" } ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13280", "reference_id": "RHSA-2026:13280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13281", "reference_id": "RHSA-2026:13281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13282", "reference_id": "RHSA-2026:13282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13283", "reference_id": "RHSA-2026:13283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:13693", "reference_id": "RHSA-2026:13693", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:13693" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8467", "reference_id": "RHSA-2026:8467", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8467" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8468", "reference_id": "RHSA-2026:8468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8469", "reference_id": "RHSA-2026:8469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8470", "reference_id": "RHSA-2026:8470", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8470" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8471", "reference_id": "RHSA-2026:8471", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8472", "reference_id": "RHSA-2026:8472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8473", "reference_id": "RHSA-2026:8473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8474", "reference_id": "RHSA-2026:8474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:8475", "reference_id": "RHSA-2026:8475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:8475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9077", "reference_id": "RHSA-2026:9077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9080", "reference_id": "RHSA-2026:9080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9205", "reference_id": "RHSA-2026:9205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9205" }, { "reference_url": "https://usn.ubuntu.com/8176-1/", "reference_id": "USN-8176-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8176-1/" }, { "reference_url": "https://usn.ubuntu.com/8216-1/", "reference_id": "USN-8216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8216-1/" } ], "weaknesses": [ { "cwe_id": 787, "name": "Out-of-bounds Write", "description": "The product writes data past the end, or before the beginning, of the intended buffer." }, { "cwe_id": 20, "name": "Improper Input Validation", "description": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly." }, { "cwe_id": 121, "name": "Stack-based Buffer Overflow", "description": "A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function)." } ], "exploits": [], "severity_range_score": "7.5 - 7.5", "exploitability": "0.5", "weighted_severity": "6.8", "risk_score": 3.4, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrem-hhst-97en" }