Lookup for vulnerable packages by Package URL.
| Purl | pkg:pypi/pygit2@0.20.3 |
| Type | pypi |
| Namespace | |
| Name | pygit2 |
| Version | 0.20.3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.1.0 |
| Latest_non_vulnerable_version | 1.1.0 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1uzu-6121-x7bc |
| vulnerability_id |
VCID-1uzu-6121-x7bc |
| summary |
Out-of-bounds Read
The libgit2 library, which is used by pygit2, is vulnerable to an integer overflow which leads to an out-of-bound read. An attacker may use this flaw to leak memory addresses or cause a Denial of Service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10887 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.4918 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49212 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.4921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49104 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49136 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49165 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49118 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49172 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49169 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.49186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00258 |
| scoring_system |
epss |
| scoring_elements |
0.4916 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10887 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10887
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1uzu-6121-x7bc |
|
| 1 |
| url |
VCID-2s6d-9bsu-zqaq |
| vulnerability_id |
VCID-2s6d-9bsu-zqaq |
| summary |
Out-of-bounds Read
A flaw was found in libgit2 which is wrapped by the rugged gem. A missing check
in git_delta_apply function in `delta.c` file, may lead to an out-of-bound read while reading a binary delta file. An attacker may use this flaw to cause a Denial of Service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61206 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61225 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61058 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61135 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61163 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61128 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61192 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61212 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.61199 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.6118 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00408 |
| scoring_system |
epss |
| scoring_elements |
0.6122 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-10888 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-10888
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2s6d-9bsu-zqaq |
|
| 2 |
| url |
VCID-52tu-vs8k-fbfe |
| vulnerability_id |
VCID-52tu-vs8k-fbfe |
| summary |
libgit2: files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12278 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90663 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90667 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90677 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90686 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90697 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90712 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90709 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90728 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90725 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90723 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12278 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12278, GHSA-5wph-8frv-58vj
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-52tu-vs8k-fbfe |
|
| 3 |
| url |
VCID-nq88-cr6a-17fw |
| vulnerability_id |
VCID-nq88-cr6a-17fw |
| summary |
Out-of-bounds Read
In the library libgit2, which is used by pygit2, a remote attacker can send a crafted smart-protocol `ng` packet that lacks a `\0` byte to trigger an out-of-bounds read leading to a DoS. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-15501 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63405 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63464 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63491 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81847 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81835 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81866 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81867 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81869 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81795 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81822 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81828 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-15501 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-15501
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nq88-cr6a-17fw |
|
| 4 |
| url |
VCID-tmtv-wcxy-sqht |
| vulnerability_id |
VCID-tmtv-wcxy-sqht |
| summary |
libgit2: NTFS protections inactive when running Git in the Windows Subsystem for Linux |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12279 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89855 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89858 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89898 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89905 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.8991 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89911 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12279 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12279, GHSA-589j-mmg9-733v
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tmtv-wcxy-sqht |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 3.6 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:pypi/pygit2@0.20.3 |