Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/57763?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57763?format=api", "vulnerability_id": "VCID-andp-4snd-rbbt", "summary": "golang.org/x/crypto/ssh NULL Pointer Dereference vulnerability\nA nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers. An attacker can craft an authentication request message for the `gssapi-with-mic` method which will cause NewServerConn to panic via a nil pointer dereference if ServerConfig.GSSAPIWithMICConfig is nil.", "aliases": [ { "alias": "CVE-2020-29652" }, { "alias": "GHSA-3vm4-22fp-5rfm" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924147?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20201221.eec23a3-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1n1h-e2p4-9yhs" }, { "vulnerability": "VCID-cmts-6kz4-zkh8" }, { "vulnerability": "VCID-et4d-ak3r-1bfa" }, { "vulnerability": "VCID-hu5a-ewvg-6ya7" }, { "vulnerability": "VCID-jwxs-gteb-kfg5" }, { "vulnerability": "VCID-jzn6-bzzf-nugp" }, { "vulnerability": "VCID-mn45-w3s3-syej" }, { "vulnerability": "VCID-n34c-71wq-s3e4" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20201221.eec23a3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/994457?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20201221.eec23a3-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1n1h-e2p4-9yhs" }, { "vulnerability": "VCID-cmts-6kz4-zkh8" }, { "vulnerability": "VCID-et4d-ak3r-1bfa" }, { "vulnerability": "VCID-hu5a-ewvg-6ya7" }, { "vulnerability": "VCID-jwxs-gteb-kfg5" }, { "vulnerability": "VCID-jzn6-bzzf-nugp" }, { "vulnerability": "VCID-mn45-w3s3-syej" }, { "vulnerability": "VCID-n34c-71wq-s3e4" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20201221.eec23a3-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/924145?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.4.0-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cmts-6kz4-zkh8" }, { "vulnerability": "VCID-hu5a-ewvg-6ya7" }, { "vulnerability": "VCID-jwxs-gteb-kfg5" }, { "vulnerability": "VCID-jzn6-bzzf-nugp" }, { "vulnerability": "VCID-mn45-w3s3-syej" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.4.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924149?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.25.0-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cmts-6kz4-zkh8" }, { "vulnerability": "VCID-hu5a-ewvg-6ya7" }, { "vulnerability": "VCID-jwxs-gteb-kfg5" }, { "vulnerability": "VCID-mn45-w3s3-syej" }, { "vulnerability": "VCID-sty6-gwh1-hbcy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.25.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924148?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.47.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.47.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076070?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.50.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.50.0-1%3Fdistro=trixie" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051175?format=api", "purl": "pkg:deb/debian/golang-go.crypto@0.0~hg190-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-37zk-9fax-v7e1" }, { "vulnerability": "VCID-3tpx-rnju-w3dw" }, { "vulnerability": "VCID-andp-4snd-rbbt" }, { "vulnerability": "VCID-t5dk-qg2g-3qhp" }, { "vulnerability": "VCID-zvd3-3b1h-77ef" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@0.0~hg190-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051176?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20150608-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-37zk-9fax-v7e1" }, { "vulnerability": "VCID-3tpx-rnju-w3dw" }, { "vulnerability": "VCID-andp-4snd-rbbt" }, { "vulnerability": "VCID-t5dk-qg2g-3qhp" }, { "vulnerability": "VCID-zvd3-3b1h-77ef" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20150608-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051177?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20161012.0.5f31782-1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-37zk-9fax-v7e1" }, { "vulnerability": "VCID-3tpx-rnju-w3dw" }, { "vulnerability": "VCID-andp-4snd-rbbt" }, { "vulnerability": "VCID-t5dk-qg2g-3qhp" }, { "vulnerability": "VCID-zvd3-3b1h-77ef" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20161012.0.5f31782-1~bpo8%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051178?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20161012.0.5f31782-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-37zk-9fax-v7e1" }, { "vulnerability": "VCID-3tpx-rnju-w3dw" }, { "vulnerability": "VCID-andp-4snd-rbbt" }, { "vulnerability": "VCID-t5dk-qg2g-3qhp" }, { "vulnerability": "VCID-zvd3-3b1h-77ef" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20161012.0.5f31782-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051179?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20170407.0.55a552f%2BREALLY.0.0~git20161012.0.5f31782-1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-37zk-9fax-v7e1" }, { "vulnerability": "VCID-3tpx-rnju-w3dw" }, { "vulnerability": "VCID-andp-4snd-rbbt" }, { "vulnerability": "VCID-t5dk-qg2g-3qhp" }, { "vulnerability": "VCID-zvd3-3b1h-77ef" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20170407.0.55a552f%252BREALLY.0.0~git20161012.0.5f31782-1~bpo8%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051180?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20170407.0.55a552f%2BREALLY.0.0~git20161012.0.5f31782-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-37zk-9fax-v7e1" }, { "vulnerability": "VCID-3tpx-rnju-w3dw" }, { "vulnerability": "VCID-andp-4snd-rbbt" }, { "vulnerability": "VCID-zvd3-3b1h-77ef" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20170407.0.55a552f%252BREALLY.0.0~git20161012.0.5f31782-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1057302?format=api", "purl": "pkg:deb/debian/golang-go.crypto@1:0.0~git20181203.505ab14-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-37zk-9fax-v7e1" }, { "vulnerability": "VCID-3tpx-rnju-w3dw" }, { "vulnerability": "VCID-andp-4snd-rbbt" }, { "vulnerability": "VCID-zvd3-3b1h-77ef" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/golang-go.crypto@1:0.0~git20181203.505ab14-1" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29652.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0889", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08777", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08779", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08757", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08629", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08618", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08771", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08784", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0874", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08743", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0867", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08822", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08897", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0886", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08674", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08702", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0875", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08751", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29652" }, { "reference_url": "https://go.dev/cl/278852", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.dev/cl/278852" }, { "reference_url": "https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8" }, { "reference_url": "https://go-review.googlesource.com/c/crypto/+/278852", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://go-review.googlesource.com/c/crypto/+/278852" }, { "reference_url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://groups.google.com/g/golang-announce/c/ouZIlBimOsE?pli=1" }, { "reference_url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r68032132c0399c29d6cdc7bd44918535da54060a10a12b1591328bff@%3Cnotifications.skywalking.apache.org%3E" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29652" }, { "reference_url": "https://pkg.go.dev/vuln/GO-2021-0227", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://pkg.go.dev/vuln/GO-2021-0227" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883", "reference_id": "1908883", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908883" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5633", "reference_id": "RHSA-2020:5633", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5633" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1796", "reference_id": "RHSA-2021:1796", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1796" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2920", "reference_id": "RHSA-2021:2920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2920" } ], "weaknesses": [ { "cwe_id": 476, "name": "NULL Pointer Dereference", "description": "A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit." } ], "exploits": [], "severity_range_score": "7.0 - 8.9", "exploitability": "0.5", "weighted_severity": "8.0", "risk_score": 4.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-andp-4snd-rbbt" }