Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/83606?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83606?format=api", "vulnerability_id": "VCID-er9h-5wad-buhg", "summary": "libgit2: denial of service (DoS) via crafted repository index files", "aliases": [ { "alias": "CVE-2018-8098" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/927449?format=api", "purl": "pkg:deb/debian/libgit2@0.27.0%2Bdfsg.1-0.6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@0.27.0%252Bdfsg.1-0.6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049409?format=api", "purl": "pkg:deb/debian/libgit2@0.27.7%2Bdfsg.1-0.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-52tu-vs8k-fbfe" }, { "vulnerability": "VCID-fhjz-7s1y-f7bm" }, { "vulnerability": "VCID-t2ph-v249-a7g9" }, { "vulnerability": "VCID-tmtv-wcxy-sqht" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@0.27.7%252Bdfsg.1-0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/927442?format=api", "purl": "pkg:deb/debian/libgit2@1.1.0%2Bdfsg.1-4%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@1.1.0%252Bdfsg.1-4%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/927440?format=api", "purl": "pkg:deb/debian/libgit2@1.5.1%2Bds-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@1.5.1%252Bds-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/927444?format=api", "purl": "pkg:deb/debian/libgit2@1.9.0%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@1.9.0%252Bds-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/927443?format=api", "purl": "pkg:deb/debian/libgit2@1.9.2%2Bds-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@1.9.2%252Bds-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1077445?format=api", "purl": "pkg:deb/debian/libgit2@1.9.2%2Bds-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@1.9.2%252Bds-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1081532?format=api", "purl": "pkg:deb/debian/libgit2@1.9.2%2Bds-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@1.9.2%252Bds-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1102965?format=api", "purl": "pkg:deb/debian/libgit2@1.9.3%2Bds-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@1.9.3%252Bds-1%3Fdistro=trixie" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049406?format=api", "purl": "pkg:deb/debian/libgit2@0.21.1-3~bpo7%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1uzu-6121-x7bc" }, { "vulnerability": "VCID-2s6d-9bsu-zqaq" }, { "vulnerability": "VCID-52tu-vs8k-fbfe" }, { "vulnerability": "VCID-bejf-17ah-tybt" }, { "vulnerability": "VCID-er9h-5wad-buhg" }, { "vulnerability": "VCID-fhjz-7s1y-f7bm" }, { "vulnerability": "VCID-j1c4-rux6-wygr" }, { "vulnerability": "VCID-mpm1-9224-6kgu" }, { "vulnerability": "VCID-nq88-cr6a-17fw" }, { "vulnerability": "VCID-rvbe-y541-nyh7" }, { "vulnerability": "VCID-t2ph-v249-a7g9" }, { "vulnerability": "VCID-tkgy-cec8-dfdy" }, { "vulnerability": "VCID-tmtv-wcxy-sqht" }, { "vulnerability": "VCID-xab7-k14p-uqbx" }, { "vulnerability": "VCID-yq57-g8j1-kfeu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@0.21.1-3~bpo7%252B1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049407?format=api", "purl": "pkg:deb/debian/libgit2@0.21.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1uzu-6121-x7bc" }, { "vulnerability": "VCID-2s6d-9bsu-zqaq" }, { "vulnerability": "VCID-52tu-vs8k-fbfe" }, { "vulnerability": "VCID-bejf-17ah-tybt" }, { "vulnerability": "VCID-er9h-5wad-buhg" }, { "vulnerability": "VCID-fhjz-7s1y-f7bm" }, { "vulnerability": "VCID-j1c4-rux6-wygr" }, { "vulnerability": "VCID-mpm1-9224-6kgu" }, { "vulnerability": "VCID-nq88-cr6a-17fw" }, { "vulnerability": "VCID-rvbe-y541-nyh7" }, { "vulnerability": "VCID-t2ph-v249-a7g9" }, { "vulnerability": "VCID-tkgy-cec8-dfdy" }, { "vulnerability": "VCID-tmtv-wcxy-sqht" }, { "vulnerability": "VCID-xab7-k14p-uqbx" }, { "vulnerability": "VCID-yq57-g8j1-kfeu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@0.21.1-3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049408?format=api", "purl": "pkg:deb/debian/libgit2@0.25.1%2Breally0.24.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1uzu-6121-x7bc" }, { "vulnerability": "VCID-2s6d-9bsu-zqaq" }, { "vulnerability": "VCID-52tu-vs8k-fbfe" }, { "vulnerability": "VCID-er9h-5wad-buhg" }, { "vulnerability": "VCID-fhjz-7s1y-f7bm" }, { "vulnerability": "VCID-mpm1-9224-6kgu" }, { "vulnerability": "VCID-nq88-cr6a-17fw" }, { "vulnerability": "VCID-t2ph-v249-a7g9" }, { "vulnerability": "VCID-tmtv-wcxy-sqht" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgit2@0.25.1%252Breally0.24.6-1" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8098.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8098.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8098", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72897", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72949", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72974", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72956", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.7295", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73001", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.72994", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73034", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73044", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73041", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73035", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73061", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73086", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73047", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.7307", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00741", "scoring_system": "epss", "scoring_elements": "0.73123", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8098" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8098" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554366", "reference_id": "1554366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554366" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892961", "reference_id": "892961", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892961" } ], "weaknesses": [ { "cwe_id": 125, "name": "Out-of-bounds Read", "description": "The product reads data past the end, or before the beginning, of the intended buffer." } ], "exploits": [], "severity_range_score": "4.3 - 5.5", "exploitability": "0.5", "weighted_severity": "3.9", "risk_score": 1.9, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-er9h-5wad-buhg" }