Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/libgit2@0.25.1-r0?arch=ppc64le&distroversion=v3.12&reponame=community
Typeapk
Namespacealpine
Namelibgit2
Version0.25.1-r0
Qualifiers
arch ppc64le
distroversion v3.12
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.27.3-r0
Latest_non_vulnerable_version0.28.4-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-bejf-17ah-tybt
vulnerability_id VCID-bejf-17ah-tybt
summary Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10128
reference_id
reference_type
scores
0
value 0.02741
scoring_system epss
scoring_elements 0.85995
published_at 2026-04-21T12:55:00Z
1
value 0.02741
scoring_system epss
scoring_elements 0.85982
published_at 2026-04-13T12:55:00Z
2
value 0.02741
scoring_system epss
scoring_elements 0.86
published_at 2026-04-16T12:55:00Z
3
value 0.02741
scoring_system epss
scoring_elements 0.86005
published_at 2026-04-18T12:55:00Z
4
value 0.02741
scoring_system epss
scoring_elements 0.85915
published_at 2026-04-01T12:55:00Z
5
value 0.02741
scoring_system epss
scoring_elements 0.85927
published_at 2026-04-02T12:55:00Z
6
value 0.02741
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-04T12:55:00Z
7
value 0.02741
scoring_system epss
scoring_elements 0.85946
published_at 2026-04-07T12:55:00Z
8
value 0.02741
scoring_system epss
scoring_elements 0.85964
published_at 2026-04-08T12:55:00Z
9
value 0.02741
scoring_system epss
scoring_elements 0.85974
published_at 2026-04-09T12:55:00Z
10
value 0.02741
scoring_system epss
scoring_elements 0.85989
published_at 2026-04-11T12:55:00Z
11
value 0.02741
scoring_system epss
scoring_elements 0.85987
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10128
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10128
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
7
reference_url https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834
8
reference_url https://libgit2.github.com/security/
reference_id
reference_type
scores
url https://libgit2.github.com/security/
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/5
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/6
11
reference_url http://www.securityfocus.com/bid/95338
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95338
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
reference_id 851406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
reference_id 860990
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
14
reference_url https://security.archlinux.org/ASA-201701-21
reference_id ASA-201701-21
reference_type
scores
url https://security.archlinux.org/ASA-201701-21
15
reference_url https://security.archlinux.org/AVG-131
reference_id AVG-131
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-131
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10128
reference_id CVE-2016-10128
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-10128
fixed_packages
0
url pkg:apk/alpine/libgit2@0.25.1-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/libgit2@0.25.1-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libgit2@0.25.1-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2016-10128
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bejf-17ah-tybt
1
url VCID-rvbe-y541-nyh7
vulnerability_id VCID-rvbe-y541-nyh7
summary The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10129
reference_id
reference_type
scores
0
value 0.04784
scoring_system epss
scoring_elements 0.89483
published_at 2026-04-21T12:55:00Z
1
value 0.04784
scoring_system epss
scoring_elements 0.89476
published_at 2026-04-12T12:55:00Z
2
value 0.04784
scoring_system epss
scoring_elements 0.89471
published_at 2026-04-13T12:55:00Z
3
value 0.04784
scoring_system epss
scoring_elements 0.89485
published_at 2026-04-18T12:55:00Z
4
value 0.04784
scoring_system epss
scoring_elements 0.89432
published_at 2026-04-01T12:55:00Z
5
value 0.04784
scoring_system epss
scoring_elements 0.89436
published_at 2026-04-02T12:55:00Z
6
value 0.04784
scoring_system epss
scoring_elements 0.89447
published_at 2026-04-04T12:55:00Z
7
value 0.04784
scoring_system epss
scoring_elements 0.89449
published_at 2026-04-07T12:55:00Z
8
value 0.04784
scoring_system epss
scoring_elements 0.89465
published_at 2026-04-08T12:55:00Z
9
value 0.04784
scoring_system epss
scoring_elements 0.89469
published_at 2026-04-09T12:55:00Z
10
value 0.04784
scoring_system epss
scoring_elements 0.89478
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10129
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a
7
reference_url https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
8
reference_url https://libgit2.github.com/security/
reference_id
reference_type
scores
url https://libgit2.github.com/security/
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/5
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/6
11
reference_url http://www.securityfocus.com/bid/95339
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95339
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
reference_id 851406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
reference_id 860990
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
14
reference_url https://security.archlinux.org/ASA-201701-21
reference_id ASA-201701-21
reference_type
scores
url https://security.archlinux.org/ASA-201701-21
15
reference_url https://security.archlinux.org/AVG-131
reference_id AVG-131
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-131
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10129
reference_id CVE-2016-10129
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-10129
fixed_packages
0
url pkg:apk/alpine/libgit2@0.25.1-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/libgit2@0.25.1-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libgit2@0.25.1-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2016-10129
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rvbe-y541-nyh7
2
url VCID-xab7-k14p-uqbx
vulnerability_id VCID-xab7-k14p-uqbx
summary The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10130
reference_id
reference_type
scores
0
value 0.01054
scoring_system epss
scoring_elements 0.7761
published_at 2026-04-21T12:55:00Z
1
value 0.01054
scoring_system epss
scoring_elements 0.7758
published_at 2026-04-13T12:55:00Z
2
value 0.01054
scoring_system epss
scoring_elements 0.77617
published_at 2026-04-16T12:55:00Z
3
value 0.01054
scoring_system epss
scoring_elements 0.77616
published_at 2026-04-18T12:55:00Z
4
value 0.01054
scoring_system epss
scoring_elements 0.7752
published_at 2026-04-01T12:55:00Z
5
value 0.01054
scoring_system epss
scoring_elements 0.77525
published_at 2026-04-02T12:55:00Z
6
value 0.01054
scoring_system epss
scoring_elements 0.77551
published_at 2026-04-04T12:55:00Z
7
value 0.01054
scoring_system epss
scoring_elements 0.77531
published_at 2026-04-07T12:55:00Z
8
value 0.01054
scoring_system epss
scoring_elements 0.77562
published_at 2026-04-08T12:55:00Z
9
value 0.01054
scoring_system epss
scoring_elements 0.7757
published_at 2026-04-09T12:55:00Z
10
value 0.01054
scoring_system epss
scoring_elements 0.77596
published_at 2026-04-11T12:55:00Z
11
value 0.01054
scoring_system epss
scoring_elements 0.77581
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10130
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10130
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
7
reference_url https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
8
reference_url https://libgit2.github.com/security/
reference_id
reference_type
scores
url https://libgit2.github.com/security/
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/5
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/6
11
reference_url http://www.securityfocus.com/bid/95359
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95359
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
reference_id 851406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
reference_id 860990
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
14
reference_url https://security.archlinux.org/ASA-201701-21
reference_id ASA-201701-21
reference_type
scores
url https://security.archlinux.org/ASA-201701-21
15
reference_url https://security.archlinux.org/AVG-131
reference_id AVG-131
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-131
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10130
reference_id CVE-2016-10130
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-10130
fixed_packages
0
url pkg:apk/alpine/libgit2@0.25.1-r0?arch=ppc64le&distroversion=v3.12&reponame=community
purl pkg:apk/alpine/libgit2@0.25.1-r0?arch=ppc64le&distroversion=v3.12&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/libgit2@0.25.1-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community
aliases CVE-2016-10130
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xab7-k14p-uqbx
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/libgit2@0.25.1-r0%3Farch=ppc64le&distroversion=v3.12&reponame=community