Lookup for vulnerable packages by Package URL.
| Purl | pkg:pypi/pygit2@0.27.4 |
| Type | pypi |
| Namespace | |
| Name | pygit2 |
| Version | 0.27.4 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.1.0 |
| Latest_non_vulnerable_version | 1.1.0 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-52tu-vs8k-fbfe |
| vulnerability_id |
VCID-52tu-vs8k-fbfe |
| summary |
libgit2: files inside the .git directory may be overwritten during cloning via NTFS Alternate Data Streams |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12278 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90663 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90667 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90677 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90686 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90697 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90703 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90712 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90709 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90728 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90725 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90723 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90735 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90736 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.06011 |
| scoring_system |
epss |
| scoring_elements |
0.90731 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12278 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12278, GHSA-5wph-8frv-58vj
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-52tu-vs8k-fbfe |
|
| 1 |
| url |
VCID-tmtv-wcxy-sqht |
| vulnerability_id |
VCID-tmtv-wcxy-sqht |
| summary |
libgit2: NTFS protections inactive when running Git in the Windows Subsystem for Linux |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12279 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89855 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89858 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89893 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89898 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89905 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.8991 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89911 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.8992 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.05164 |
| scoring_system |
epss |
| scoring_elements |
0.89919 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-12279 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-12279, GHSA-589j-mmg9-733v
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tmtv-wcxy-sqht |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-nq88-cr6a-17fw |
| vulnerability_id |
VCID-nq88-cr6a-17fw |
| summary |
Out-of-bounds Read
In the library libgit2, which is used by pygit2, a remote attacker can send a crafted smart-protocol `ng` packet that lacks a `\0` byte to trigger an out-of-bounds read leading to a DoS. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-15501 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63491 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63405 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63464 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81847 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81835 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81866 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81867 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81869 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81892 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81903 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81908 |
| published_at |
2026-04-29T12:55:00Z |
|
| 12 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81795 |
| published_at |
2026-04-07T12:55:00Z |
|
| 13 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81822 |
| published_at |
2026-04-08T12:55:00Z |
|
| 14 |
| value |
0.01621 |
| scoring_system |
epss |
| scoring_elements |
0.81828 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-15501 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-15501
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nq88-cr6a-17fw |
|
|
| Risk_score | 3.6 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:pypi/pygit2@0.27.4 |