Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/git@2.34.8-r0?arch=ppc64le&distroversion=v3.15&reponame=main
Typeapk
Namespacealpine
Namegit
Version2.34.8-r0
Qualifiers
arch ppc64le
distroversion v3.15
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9ngj-sk96-kyh5
vulnerability_id VCID-9ngj-sk96-kyh5
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29007.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29007
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74413
published_at 2026-04-02T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.7444
published_at 2026-04-04T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-07T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74447
published_at 2026-04-08T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74464
published_at 2026-04-09T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74486
published_at 2026-04-11T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-12T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74457
published_at 2026-04-13T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74495
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
reference_id 1034835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188338
reference_id 2188338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188338
6
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
7
reference_url https://access.redhat.com/errata/RHSA-2023:3192
reference_id RHSA-2023:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3192
8
reference_url https://access.redhat.com/errata/RHSA-2023:3243
reference_id RHSA-2023:3243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3243
9
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
10
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
11
reference_url https://access.redhat.com/errata/RHSA-2023:3247
reference_id RHSA-2023:3247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3247
12
reference_url https://access.redhat.com/errata/RHSA-2023:3248
reference_id RHSA-2023:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3248
13
reference_url https://access.redhat.com/errata/RHSA-2023:3263
reference_id RHSA-2023:3263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3263
14
reference_url https://access.redhat.com/errata/RHSA-2023:3280
reference_id RHSA-2023:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3280
15
reference_url https://access.redhat.com/errata/RHSA-2023:3382
reference_id RHSA-2023:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3382
16
reference_url https://usn.ubuntu.com/6050-1/
reference_id USN-6050-1
reference_type
scores
url https://usn.ubuntu.com/6050-1/
17
reference_url https://usn.ubuntu.com/6050-2/
reference_id USN-6050-2
reference_type
scores
url https://usn.ubuntu.com/6050-2/
fixed_packages
0
url pkg:apk/alpine/git@2.34.8-r0?arch=ppc64le&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/git@2.34.8-r0?arch=ppc64le&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/git@2.34.8-r0%3Farch=ppc64le&distroversion=v3.15&reponame=main
aliases CVE-2023-29007
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ngj-sk96-kyh5
1
url VCID-hr22-p62n-hqd9
vulnerability_id VCID-hr22-p62n-hqd9
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25652.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25652
reference_id
reference_type
scores
0
value 0.01801
scoring_system epss
scoring_elements 0.82742
published_at 2026-04-02T12:55:00Z
1
value 0.01801
scoring_system epss
scoring_elements 0.82831
published_at 2026-04-16T12:55:00Z
2
value 0.01801
scoring_system epss
scoring_elements 0.82756
published_at 2026-04-04T12:55:00Z
3
value 0.01801
scoring_system epss
scoring_elements 0.82753
published_at 2026-04-07T12:55:00Z
4
value 0.01801
scoring_system epss
scoring_elements 0.82779
published_at 2026-04-08T12:55:00Z
5
value 0.01801
scoring_system epss
scoring_elements 0.82785
published_at 2026-04-09T12:55:00Z
6
value 0.01801
scoring_system epss
scoring_elements 0.82802
published_at 2026-04-11T12:55:00Z
7
value 0.01801
scoring_system epss
scoring_elements 0.82797
published_at 2026-04-12T12:55:00Z
8
value 0.01801
scoring_system epss
scoring_elements 0.82792
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25652
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
reference_id 1034835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
5
reference_url https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902
reference_id 18e2b1cfc80990719275d7b08e6e50f3e8cbc902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902
6
reference_url http://www.openwall.com/lists/oss-security/2023/04/25/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url http://www.openwall.com/lists/oss-security/2023/04/25/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188333
reference_id 2188333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188333
8
reference_url https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e
reference_id 668f2d53613ac8fd373926ebe219f2c29112d93e
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/
reference_id BSXOGVVBJLYX26IAYX6PJSYQB36BREWH
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/
10
reference_url https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx
reference_id GHSA-2hvf-7c8p-28fx
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx
11
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://security.gentoo.org/glsa/202312-15
12
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/
reference_id PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/
14
reference_url https://access.redhat.com/errata/RHSA-2023:3192
reference_id RHSA-2023:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3192
15
reference_url https://access.redhat.com/errata/RHSA-2023:3243
reference_id RHSA-2023:3243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3243
16
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
17
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
18
reference_url https://access.redhat.com/errata/RHSA-2023:3247
reference_id RHSA-2023:3247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3247
19
reference_url https://access.redhat.com/errata/RHSA-2023:3248
reference_id RHSA-2023:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3248
20
reference_url https://access.redhat.com/errata/RHSA-2023:3263
reference_id RHSA-2023:3263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3263
21
reference_url https://access.redhat.com/errata/RHSA-2023:3280
reference_id RHSA-2023:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3280
22
reference_url https://access.redhat.com/errata/RHSA-2023:3382
reference_id RHSA-2023:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3382
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/
reference_id RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/
24
reference_url https://usn.ubuntu.com/6050-1/
reference_id USN-6050-1
reference_type
scores
url https://usn.ubuntu.com/6050-1/
25
reference_url https://usn.ubuntu.com/6050-2/
reference_id USN-6050-2
reference_type
scores
url https://usn.ubuntu.com/6050-2/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/
reference_id YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/
fixed_packages
0
url pkg:apk/alpine/git@2.34.8-r0?arch=ppc64le&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/git@2.34.8-r0?arch=ppc64le&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/git@2.34.8-r0%3Farch=ppc64le&distroversion=v3.15&reponame=main
aliases CVE-2023-25652
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hr22-p62n-hqd9
2
url VCID-usx6-t5ns-t3bb
vulnerability_id VCID-usx6-t5ns-t3bb
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25815.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25815
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-02T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27713
published_at 2026-04-04T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27503
published_at 2026-04-07T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27571
published_at 2026-04-08T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27614
published_at 2026-04-09T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27619
published_at 2026-04-11T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27574
published_at 2026-04-12T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27518
published_at 2026-04-13T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27525
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
reference_id 1034835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188337
reference_id 2188337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188337
6
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
7
reference_url https://access.redhat.com/errata/RHSA-2023:3192
reference_id RHSA-2023:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3192
8
reference_url https://access.redhat.com/errata/RHSA-2023:3243
reference_id RHSA-2023:3243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3243
9
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
10
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
11
reference_url https://access.redhat.com/errata/RHSA-2023:3247
reference_id RHSA-2023:3247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3247
12
reference_url https://access.redhat.com/errata/RHSA-2023:3248
reference_id RHSA-2023:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3248
13
reference_url https://access.redhat.com/errata/RHSA-2023:3280
reference_id RHSA-2023:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3280
14
reference_url https://access.redhat.com/errata/RHSA-2023:3382
reference_id RHSA-2023:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3382
15
reference_url https://usn.ubuntu.com/6050-1/
reference_id USN-6050-1
reference_type
scores
url https://usn.ubuntu.com/6050-1/
16
reference_url https://usn.ubuntu.com/7023-1/
reference_id USN-7023-1
reference_type
scores
url https://usn.ubuntu.com/7023-1/
fixed_packages
0
url pkg:apk/alpine/git@2.34.8-r0?arch=ppc64le&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/git@2.34.8-r0?arch=ppc64le&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/git@2.34.8-r0%3Farch=ppc64le&distroversion=v3.15&reponame=main
aliases CVE-2023-25815
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-usx6-t5ns-t3bb
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/git@2.34.8-r0%3Farch=ppc64le&distroversion=v3.15&reponame=main