Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cargo@0.47.0-3?distro=bullseye
Typedeb
Namespacedebian
Namecargo
Version0.47.0-3
Qualifiers
distro bullseye
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version0.63.1-1
Latest_non_vulnerable_version0.66.0+ds1-1
Affected_by_vulnerabilities
0
url VCID-n4fu-fzu3-sbex
vulnerability_id VCID-n4fu-fzu3-sbex
summary
Cargo did not verify SSH host keys
The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks.

This vulnerability has been assigned CVE-2022-46176.

## Overview

When an SSH client establishes communication with a server, to prevent MITM attacks the client should check whether it already communicated with that server in the past and what the server's public key was back then. If the key changed since the last connection, the connection must be aborted as a MITM attack is likely taking place.

It was discovered that Cargo never implemented such checks, and performed no validation on the server's public key, leaving Cargo users vulnerable to MITM attacks.

## Affected Versions

All Rust versions containing Cargo before 1.66.1 are vulnerable (prior to 0.67.1 for the crates.io package).

Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH.

## Mitigations

We will be releasing Rust 1.66.1 today, 2023-01-10, changing Cargo to check the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

Patch files for Rust 1.66.0 are also available [here][2] for custom-built toolchains.

For the time being Cargo will not ask the user whether to trust a server's public key during the first connection. Instead, Cargo will show an error message detailing how to add that public key to the list of trusted keys. Note that this might break your automated builds if the hosts you clone dependencies or indexes from are not already trusted.

If you can't upgrade to Rust 1.66.1 yet, we recommend configuring Cargo to use the `git` CLI instead of its built-in git support. That way, all git network operations will be performed by the `git` CLI, which is not affected by this vulnerability. You can do so by adding this snippet to your [Cargo configuration file](https://doc.rust-lang.org/cargo/reference/config.html):

```toml
[net]
git-fetch-with-cli = true
```

## Acknowledgments

Thanks to the Julia Security Team for disclosing this to us according to our [security policy][3]!

We also want to thank the members of the Rust project who contributed to fixing this issue. Thanks to Eric Huss and Weihang Lo for writing and reviewing the patch, Pietro Albini for coordinating the disclosure and writing this advisory, and Josh Stone, Josh Triplett and Jacob Finkelman for advising during the disclosure.

[1]: https://git-scm.com/docs/git-config#Documentation/git-config.txt-urlltbasegtinsteadOf
[2]: https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
[3]: https://www.rust-lang.org/policies/security
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46176.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46176
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35363
published_at 2026-04-21T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35415
published_at 2026-04-18T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35428
published_at 2026-04-16T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35388
published_at 2026-04-13T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35411
published_at 2026-04-12T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35453
published_at 2026-04-11T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35445
published_at 2026-04-09T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.3542
published_at 2026-04-08T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35374
published_at 2026-04-07T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35491
published_at 2026-04-04T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35466
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/rust-lang/cargo
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo
5
reference_url https://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:13Z/
url https://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j
6
reference_url https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:13Z/
url https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
7
reference_url https://git-scm.com/docs/git-config#Documentation/git-config.txt-urlltbasegtinsteadOf
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://git-scm.com/docs/git-config#Documentation/git-config.txt-urlltbasegtinsteadOf
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-46176
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-46176
9
reference_url https://www.rust-lang.org/policies/security
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.rust-lang.org/policies/security
10
reference_url http://www.openwall.com/lists/oss-security/2023/11/05/6
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:13Z/
url http://www.openwall.com/lists/oss-security/2023/11/05/6
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2160363
reference_id 2160363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2160363
12
reference_url http://www.openwall.com/lists/oss-security/2023/11/06/5
reference_id 5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-10T21:00:13Z/
url http://www.openwall.com/lists/oss-security/2023/11/06/5
13
reference_url https://github.com/advisories/GHSA-r5w3-xm58-jv6j
reference_id GHSA-r5w3-xm58-jv6j
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r5w3-xm58-jv6j
14
reference_url https://security.gentoo.org/glsa/202409-07
reference_id GLSA-202409-07
reference_type
scores
url https://security.gentoo.org/glsa/202409-07
fixed_packages
0
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2022-46176, GHSA-r5w3-xm58-jv6j
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n4fu-fzu3-sbex
1
url VCID-r9ky-9nbm-yucw
vulnerability_id VCID-r9ky-9nbm-yucw
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36113
reference_id
reference_type
scores
0
value 0.08941
scoring_system epss
scoring_elements 0.9256
published_at 2026-04-02T12:55:00Z
1
value 0.08941
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-21T12:55:00Z
2
value 0.08941
scoring_system epss
scoring_elements 0.92604
published_at 2026-04-18T12:55:00Z
3
value 0.08941
scoring_system epss
scoring_elements 0.92605
published_at 2026-04-16T12:55:00Z
4
value 0.08941
scoring_system epss
scoring_elements 0.92592
published_at 2026-04-12T12:55:00Z
5
value 0.08941
scoring_system epss
scoring_elements 0.92591
published_at 2026-04-13T12:55:00Z
6
value 0.08941
scoring_system epss
scoring_elements 0.92586
published_at 2026-04-09T12:55:00Z
7
value 0.08941
scoring_system epss
scoring_elements 0.92581
published_at 2026-04-08T12:55:00Z
8
value 0.08941
scoring_system epss
scoring_elements 0.9257
published_at 2026-04-07T12:55:00Z
9
value 0.08941
scoring_system epss
scoring_elements 0.92567
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36113
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36113
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/rust-lang/cargo
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo
4
reference_url https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a
5
reference_url https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:37Z/
url https://github.com/rust-lang/cargo/commit/97b80919e404b0768ea31ae329c3b4da54bed05a
6
reference_url https://github.com/rust-lang/cargo/commit/dafe4a7ea016739680ec7998aebe1bc6de131a5b
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/dafe4a7ea016739680ec7998aebe1bc6de131a5b
7
reference_url https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
2
value LOW
scoring_system cvssv3.1_qr
scoring_elements
3
value LOW
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:37Z/
url https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36113
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36113
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
reference_id 1021142
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
reference_id 1021143
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
11
reference_url https://github.com/advisories/GHSA-rfj2-q3h3-hm5j
reference_id GHSA-rfj2-q3h3-hm5j
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rfj2-q3h3-hm5j
12
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
1
value LOW
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-09
fixed_packages
0
url pkg:deb/debian/cargo@0.63.1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.63.1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.63.1-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2022-36113, GHSA-rfj2-q3h3-hm5j
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9ky-9nbm-yucw
2
url VCID-ssct-y25y-3qbw
vulnerability_id VCID-ssct-y25y-3qbw
summary Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36114
reference_id
reference_type
scores
0
value 0.0048
scoring_system epss
scoring_elements 0.65047
published_at 2026-04-02T12:55:00Z
1
value 0.0048
scoring_system epss
scoring_elements 0.65109
published_at 2026-04-21T12:55:00Z
2
value 0.0048
scoring_system epss
scoring_elements 0.65125
published_at 2026-04-18T12:55:00Z
3
value 0.0048
scoring_system epss
scoring_elements 0.65116
published_at 2026-04-16T12:55:00Z
4
value 0.0048
scoring_system epss
scoring_elements 0.6508
published_at 2026-04-13T12:55:00Z
5
value 0.0048
scoring_system epss
scoring_elements 0.65108
published_at 2026-04-12T12:55:00Z
6
value 0.0048
scoring_system epss
scoring_elements 0.65118
published_at 2026-04-11T12:55:00Z
7
value 0.0048
scoring_system epss
scoring_elements 0.65099
published_at 2026-04-09T12:55:00Z
8
value 0.0048
scoring_system epss
scoring_elements 0.65086
published_at 2026-04-08T12:55:00Z
9
value 0.0048
scoring_system epss
scoring_elements 0.65036
published_at 2026-04-07T12:55:00Z
10
value 0.0048
scoring_system epss
scoring_elements 0.65074
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36114
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36114
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/rust-lang/cargo
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo
4
reference_url https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3
5
reference_url https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:35Z/
url https://github.com/rust-lang/cargo/commit/d1f9553c825f6d7481453be8d58d0e7f117988a7
6
reference_url https://github.com/rust-lang/cargo/commit/d87d57dbbda61754f4fab0f329a7ac520e062c46
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/cargo/commit/d87d57dbbda61754f4fab0f329a7ac520e062c46
7
reference_url https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:00:35Z/
url https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-36114
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-36114
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
reference_id 1021142
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021142
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
reference_id 1021143
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021143
11
reference_url https://github.com/advisories/GHSA-2hvr-h6gw-qrxp
reference_id GHSA-2hvr-h6gw-qrxp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2hvr-h6gw-qrxp
12
reference_url https://security.gentoo.org/glsa/202210-09
reference_id GLSA-202210-09
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202210-09
fixed_packages
0
url pkg:deb/debian/cargo@0.63.1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.63.1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.63.1-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2022-36114, GHSA-2hvr-h6gw-qrxp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssct-y25y-3qbw
Fixing_vulnerabilities
0
url VCID-bejf-17ah-tybt
vulnerability_id VCID-bejf-17ah-tybt
summary Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10128
reference_id
reference_type
scores
0
value 0.02741
scoring_system epss
scoring_elements 0.85995
published_at 2026-04-21T12:55:00Z
1
value 0.02741
scoring_system epss
scoring_elements 0.85982
published_at 2026-04-13T12:55:00Z
2
value 0.02741
scoring_system epss
scoring_elements 0.86
published_at 2026-04-16T12:55:00Z
3
value 0.02741
scoring_system epss
scoring_elements 0.86005
published_at 2026-04-18T12:55:00Z
4
value 0.02741
scoring_system epss
scoring_elements 0.85915
published_at 2026-04-01T12:55:00Z
5
value 0.02741
scoring_system epss
scoring_elements 0.85927
published_at 2026-04-02T12:55:00Z
6
value 0.02741
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-04T12:55:00Z
7
value 0.02741
scoring_system epss
scoring_elements 0.85946
published_at 2026-04-07T12:55:00Z
8
value 0.02741
scoring_system epss
scoring_elements 0.85964
published_at 2026-04-08T12:55:00Z
9
value 0.02741
scoring_system epss
scoring_elements 0.85974
published_at 2026-04-09T12:55:00Z
10
value 0.02741
scoring_system epss
scoring_elements 0.85989
published_at 2026-04-11T12:55:00Z
11
value 0.02741
scoring_system epss
scoring_elements 0.85987
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10128
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10128
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10128
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2
7
reference_url https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834
8
reference_url https://libgit2.github.com/security/
reference_id
reference_type
scores
url https://libgit2.github.com/security/
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/5
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/6
11
reference_url http://www.securityfocus.com/bid/95338
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95338
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
reference_id 851406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
reference_id 860990
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
14
reference_url https://security.archlinux.org/ASA-201701-21
reference_id ASA-201701-21
reference_type
scores
url https://security.archlinux.org/ASA-201701-21
15
reference_url https://security.archlinux.org/AVG-131
reference_id AVG-131
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-131
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10128
reference_id CVE-2016-10128
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-10128
fixed_packages
0
url pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
purl pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.17.0-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
purl pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n4fu-fzu3-sbex
1
vulnerability VCID-r9ky-9nbm-yucw
2
vulnerability VCID-ssct-y25y-3qbw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.47.0-3%3Fdistro=bullseye
2
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2016-10128
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bejf-17ah-tybt
1
url VCID-dmxp-cg8g-d7fn
vulnerability_id VCID-dmxp-cg8g-d7fn
summary Cargo prior to Rust 1.26.0 may download the wrong dependency if your package.toml file uses the `package` configuration key. Usage of the `package` key to rename dependencies in `Cargo.toml` is ignored in Rust 1.25.0 and prior. When Rust 1.25.0 and prior is used Cargo may download the wrong dependency, which could be squatted on crates.io to be a malicious package. This not only affects manifests that you write locally yourself, but also manifests published to crates.io. Rust 1.0.0 through Rust 1.25.0 is affected by this advisory because Cargo will ignore the `package` key in manifests. Rust 1.26.0 through Rust 1.30.0 are not affected and typically will emit an error because the `package` key is unstable. Rust 1.31.0 and after are not affected because Cargo understands the `package` key. Users of the affected versions are strongly encouraged to update their compiler to the latest available one. Preventing this issue from happening requires updating your compiler to be either Rust 1.26.0 or newer. There will be no point release for Rust versions prior to 1.26.0. Users of Rust 1.19.0 to Rust 1.25.0 can instead apply linked patches to mitigate the issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16760.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-16760
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39749
published_at 2026-04-21T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39688
published_at 2026-04-01T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39837
published_at 2026-04-02T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.3986
published_at 2026-04-04T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39781
published_at 2026-04-07T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39836
published_at 2026-04-08T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.3985
published_at 2026-04-09T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39859
published_at 2026-04-16T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39825
published_at 2026-04-12T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39808
published_at 2026-04-13T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.3983
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-16760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16760
3
reference_url https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://gist.github.com/pietroalbini/0d293b24a44babbeb6187e06eebd4992
4
reference_url https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/rust/security/advisories/GHSA-phjm-8x66-qw4r
5
reference_url https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21topic/rustlang-security-announcements/rVQ5e3TDnpQ
6
reference_url https://groups.google.com/forum/#!topic/rustlang-security-announcements/rVQ5e3TDnpQ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!topic/rustlang-security-announcements/rVQ5e3TDnpQ
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-16760
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-16760
8
reference_url http://www.openwall.com/lists/oss-security/2019/10/08/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2019/10/08/3
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1759773
reference_id 1759773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1759773
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*
11
reference_url https://github.com/advisories/GHSA-9f3p-wvj7-q82x
reference_id GHSA-9f3p-wvj7-q82x
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9f3p-wvj7-q82x
fixed_packages
0
url pkg:deb/debian/cargo@0.27.0-1?distro=bullseye
purl pkg:deb/debian/cargo@0.27.0-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.27.0-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
purl pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n4fu-fzu3-sbex
1
vulnerability VCID-r9ky-9nbm-yucw
2
vulnerability VCID-ssct-y25y-3qbw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.47.0-3%3Fdistro=bullseye
2
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2019-16760, GHSA-9f3p-wvj7-q82x
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dmxp-cg8g-d7fn
2
url VCID-rvbe-y541-nyh7
vulnerability_id VCID-rvbe-y541-nyh7
summary The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10129
reference_id
reference_type
scores
0
value 0.04784
scoring_system epss
scoring_elements 0.89483
published_at 2026-04-21T12:55:00Z
1
value 0.04784
scoring_system epss
scoring_elements 0.89476
published_at 2026-04-12T12:55:00Z
2
value 0.04784
scoring_system epss
scoring_elements 0.89471
published_at 2026-04-13T12:55:00Z
3
value 0.04784
scoring_system epss
scoring_elements 0.89485
published_at 2026-04-18T12:55:00Z
4
value 0.04784
scoring_system epss
scoring_elements 0.89432
published_at 2026-04-01T12:55:00Z
5
value 0.04784
scoring_system epss
scoring_elements 0.89436
published_at 2026-04-02T12:55:00Z
6
value 0.04784
scoring_system epss
scoring_elements 0.89447
published_at 2026-04-04T12:55:00Z
7
value 0.04784
scoring_system epss
scoring_elements 0.89449
published_at 2026-04-07T12:55:00Z
8
value 0.04784
scoring_system epss
scoring_elements 0.89465
published_at 2026-04-08T12:55:00Z
9
value 0.04784
scoring_system epss
scoring_elements 0.89469
published_at 2026-04-09T12:55:00Z
10
value 0.04784
scoring_system epss
scoring_elements 0.89478
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10129
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10129
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10129
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a
7
reference_url https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
8
reference_url https://libgit2.github.com/security/
reference_id
reference_type
scores
url https://libgit2.github.com/security/
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/5
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/6
11
reference_url http://www.securityfocus.com/bid/95339
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95339
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
reference_id 851406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
reference_id 860990
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
14
reference_url https://security.archlinux.org/ASA-201701-21
reference_id ASA-201701-21
reference_type
scores
url https://security.archlinux.org/ASA-201701-21
15
reference_url https://security.archlinux.org/AVG-131
reference_id AVG-131
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-131
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10129
reference_id CVE-2016-10129
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-10129
fixed_packages
0
url pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
purl pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.17.0-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
purl pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n4fu-fzu3-sbex
1
vulnerability VCID-r9ky-9nbm-yucw
2
vulnerability VCID-ssct-y25y-3qbw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.47.0-3%3Fdistro=bullseye
2
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2016-10129
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rvbe-y541-nyh7
3
url VCID-tkgy-cec8-dfdy
vulnerability_id VCID-tkgy-cec8-dfdy
summary The git_oid_nfmt function in commit.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a cat-file command with a crafted object file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8569
reference_id
reference_type
scores
0
value 0.00554
scoring_system epss
scoring_elements 0.68099
published_at 2026-04-21T12:55:00Z
1
value 0.00554
scoring_system epss
scoring_elements 0.68007
published_at 2026-04-01T12:55:00Z
2
value 0.00554
scoring_system epss
scoring_elements 0.68028
published_at 2026-04-02T12:55:00Z
3
value 0.00554
scoring_system epss
scoring_elements 0.68047
published_at 2026-04-04T12:55:00Z
4
value 0.00554
scoring_system epss
scoring_elements 0.68024
published_at 2026-04-07T12:55:00Z
5
value 0.00554
scoring_system epss
scoring_elements 0.68076
published_at 2026-04-08T12:55:00Z
6
value 0.00554
scoring_system epss
scoring_elements 0.6809
published_at 2026-04-09T12:55:00Z
7
value 0.00554
scoring_system epss
scoring_elements 0.68114
published_at 2026-04-11T12:55:00Z
8
value 0.00554
scoring_system epss
scoring_elements 0.68101
published_at 2026-04-12T12:55:00Z
9
value 0.00554
scoring_system epss
scoring_elements 0.68068
published_at 2026-04-13T12:55:00Z
10
value 0.00554
scoring_system epss
scoring_elements 0.68104
published_at 2026-04-16T12:55:00Z
11
value 0.00554
scoring_system epss
scoring_elements 0.68117
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8569
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8569
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840227
reference_id 840227
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840227
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860989
reference_id 860989
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860989
4
reference_url https://security.archlinux.org/ASA-201611-17
reference_id ASA-201611-17
reference_type
scores
url https://security.archlinux.org/ASA-201611-17
5
reference_url https://security.archlinux.org/AVG-45
reference_id AVG-45
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-45
6
reference_url https://usn.ubuntu.com/USN-4798-1/
reference_id USN-USN-4798-1
reference_type
scores
url https://usn.ubuntu.com/USN-4798-1/
fixed_packages
0
url pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
purl pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.17.0-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
purl pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n4fu-fzu3-sbex
1
vulnerability VCID-r9ky-9nbm-yucw
2
vulnerability VCID-ssct-y25y-3qbw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.47.0-3%3Fdistro=bullseye
2
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2016-8569
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tkgy-cec8-dfdy
4
url VCID-xab7-k14p-uqbx
vulnerability_id VCID-xab7-k14p-uqbx
summary The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00036.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2017-02/msg00072.html
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10130
reference_id
reference_type
scores
0
value 0.01054
scoring_system epss
scoring_elements 0.7761
published_at 2026-04-21T12:55:00Z
1
value 0.01054
scoring_system epss
scoring_elements 0.7758
published_at 2026-04-13T12:55:00Z
2
value 0.01054
scoring_system epss
scoring_elements 0.77617
published_at 2026-04-16T12:55:00Z
3
value 0.01054
scoring_system epss
scoring_elements 0.77616
published_at 2026-04-18T12:55:00Z
4
value 0.01054
scoring_system epss
scoring_elements 0.7752
published_at 2026-04-01T12:55:00Z
5
value 0.01054
scoring_system epss
scoring_elements 0.77525
published_at 2026-04-02T12:55:00Z
6
value 0.01054
scoring_system epss
scoring_elements 0.77551
published_at 2026-04-04T12:55:00Z
7
value 0.01054
scoring_system epss
scoring_elements 0.77531
published_at 2026-04-07T12:55:00Z
8
value 0.01054
scoring_system epss
scoring_elements 0.77562
published_at 2026-04-08T12:55:00Z
9
value 0.01054
scoring_system epss
scoring_elements 0.7757
published_at 2026-04-09T12:55:00Z
10
value 0.01054
scoring_system epss
scoring_elements 0.77596
published_at 2026-04-11T12:55:00Z
11
value 0.01054
scoring_system epss
scoring_elements 0.77581
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10130
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10130
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10130
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
7
reference_url https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
reference_id
reference_type
scores
url https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
8
reference_url https://libgit2.github.com/security/
reference_id
reference_type
scores
url https://libgit2.github.com/security/
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/5
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/6
11
reference_url http://www.securityfocus.com/bid/95359
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95359
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
reference_id 851406
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=851406
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
reference_id 860990
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860990
14
reference_url https://security.archlinux.org/ASA-201701-21
reference_id ASA-201701-21
reference_type
scores
url https://security.archlinux.org/ASA-201701-21
15
reference_url https://security.archlinux.org/AVG-131
reference_id AVG-131
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-131
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libgit2_project:libgit2:0.25.0:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10130
reference_id CVE-2016-10130
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-10130
fixed_packages
0
url pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
purl pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.17.0-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
purl pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n4fu-fzu3-sbex
1
vulnerability VCID-r9ky-9nbm-yucw
2
vulnerability VCID-ssct-y25y-3qbw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.47.0-3%3Fdistro=bullseye
2
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2016-10130
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xab7-k14p-uqbx
5
url VCID-yq57-g8j1-kfeu
vulnerability_id VCID-yq57-g8j1-kfeu
summary The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8568
reference_id
reference_type
scores
0
value 0.00469
scoring_system epss
scoring_elements 0.64574
published_at 2026-04-21T12:55:00Z
1
value 0.00469
scoring_system epss
scoring_elements 0.64462
published_at 2026-04-01T12:55:00Z
2
value 0.00469
scoring_system epss
scoring_elements 0.64516
published_at 2026-04-02T12:55:00Z
3
value 0.00469
scoring_system epss
scoring_elements 0.64545
published_at 2026-04-04T12:55:00Z
4
value 0.00469
scoring_system epss
scoring_elements 0.64503
published_at 2026-04-07T12:55:00Z
5
value 0.00469
scoring_system epss
scoring_elements 0.64552
published_at 2026-04-08T12:55:00Z
6
value 0.00469
scoring_system epss
scoring_elements 0.64568
published_at 2026-04-09T12:55:00Z
7
value 0.00469
scoring_system epss
scoring_elements 0.64584
published_at 2026-04-11T12:55:00Z
8
value 0.00469
scoring_system epss
scoring_elements 0.64571
published_at 2026-04-12T12:55:00Z
9
value 0.00469
scoring_system epss
scoring_elements 0.64543
published_at 2026-04-13T12:55:00Z
10
value 0.00469
scoring_system epss
scoring_elements 0.64577
published_at 2026-04-16T12:55:00Z
11
value 0.00469
scoring_system epss
scoring_elements 0.64588
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8568
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8568
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840227
reference_id 840227
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840227
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860989
reference_id 860989
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860989
4
reference_url https://security.archlinux.org/ASA-201611-17
reference_id ASA-201611-17
reference_type
scores
url https://security.archlinux.org/ASA-201611-17
5
reference_url https://security.archlinux.org/AVG-45
reference_id AVG-45
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-45
6
reference_url https://usn.ubuntu.com/USN-4798-1/
reference_id USN-USN-4798-1
reference_type
scores
url https://usn.ubuntu.com/USN-4798-1/
fixed_packages
0
url pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
purl pkg:deb/debian/cargo@0.17.0-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.17.0-1%3Fdistro=bullseye
1
url pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
purl pkg:deb/debian/cargo@0.47.0-3?distro=bullseye
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n4fu-fzu3-sbex
1
vulnerability VCID-r9ky-9nbm-yucw
2
vulnerability VCID-ssct-y25y-3qbw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.47.0-3%3Fdistro=bullseye
2
url pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
purl pkg:deb/debian/cargo@0.66.0%2Bds1-1?distro=bullseye
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.66.0%252Bds1-1%3Fdistro=bullseye
aliases CVE-2016-8568
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq57-g8j1-kfeu
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cargo@0.47.0-3%3Fdistro=bullseye