Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-vcs/git@2.39.3
Typeebuild
Namespacedev-vcs
Namegit
Version2.39.3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.49.1
Latest_non_vulnerable_version2.49.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1zaq-cvdq-8bb6
vulnerability_id VCID-1zaq-cvdq-8bb6
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23946.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23946
reference_id
reference_type
scores
0
value 0.01498
scoring_system epss
scoring_elements 0.81161
published_at 2026-04-21T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-16T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.8218
published_at 2026-04-18T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82103
published_at 2026-04-07T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.8213
published_at 2026-04-08T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-09T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82157
published_at 2026-04-11T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82148
published_at 2026-04-12T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82142
published_at 2026-04-13T12:55:00Z
9
value 0.03035
scoring_system epss
scoring_elements 0.86612
published_at 2026-04-02T12:55:00Z
10
value 0.03035
scoring_system epss
scoring_elements 0.86632
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22490
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23946
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031310
reference_id 1031310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031310
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168161
reference_id 2168161
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168161
7
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
8
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
9
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
10
reference_url https://access.redhat.com/errata/RHSA-2024:0407
reference_id RHSA-2024:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0407
11
reference_url https://usn.ubuntu.com/5871-1/
reference_id USN-5871-1
reference_type
scores
url https://usn.ubuntu.com/5871-1/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2023-23946
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1zaq-cvdq-8bb6
1
url VCID-3bkb-3m1h-m7fw
vulnerability_id VCID-3bkb-3m1h-m7fw
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41903.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41903.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41903
reference_id
reference_type
scores
0
value 0.22424
scoring_system epss
scoring_elements 0.95849
published_at 2026-04-21T12:55:00Z
1
value 0.22424
scoring_system epss
scoring_elements 0.95824
published_at 2026-04-09T12:55:00Z
2
value 0.22424
scoring_system epss
scoring_elements 0.95828
published_at 2026-04-12T12:55:00Z
3
value 0.22424
scoring_system epss
scoring_elements 0.95829
published_at 2026-04-13T12:55:00Z
4
value 0.22424
scoring_system epss
scoring_elements 0.95841
published_at 2026-04-16T12:55:00Z
5
value 0.22424
scoring_system epss
scoring_elements 0.95846
published_at 2026-04-18T12:55:00Z
6
value 0.25734
scoring_system epss
scoring_elements 0.96223
published_at 2026-04-04T12:55:00Z
7
value 0.25734
scoring_system epss
scoring_elements 0.96216
published_at 2026-04-02T12:55:00Z
8
value 0.25734
scoring_system epss
scoring_elements 0.96237
published_at 2026-04-08T12:55:00Z
9
value 0.25734
scoring_system epss
scoring_elements 0.96228
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41903
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
reference_id 1029114
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162056
reference_id 2162056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162056
11
reference_url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_id 508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
12
reference_url https://git-scm.com/book/en/v2/Customizing-Git-Git-Attributes#_export_subst
reference_id Customizing-Git-Git-Attributes#_export_subst
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://git-scm.com/book/en/v2/Customizing-Git-Git-Attributes#_export_subst
13
reference_url https://github.com/git/git/security/advisories/GHSA-475x-2q3q-hvwq
reference_id GHSA-475x-2q3q-hvwq
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://github.com/git/git/security/advisories/GHSA-475x-2q3q-hvwq
14
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://security.gentoo.org/glsa/202312-15
15
reference_url https://git-scm.com/docs/pretty-formats#Documentation/pretty-formats.txt-emltltNgttruncltruncmtruncem
reference_id pretty-formats.txt-emltltNgttruncltruncmtruncem
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-10T20:59:12Z/
url https://git-scm.com/docs/pretty-formats#Documentation/pretty-formats.txt-emltltNgttruncltruncmtruncem
16
reference_url https://access.redhat.com/errata/RHSA-2023:0596
reference_id RHSA-2023:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0596
17
reference_url https://access.redhat.com/errata/RHSA-2023:0597
reference_id RHSA-2023:0597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0597
18
reference_url https://access.redhat.com/errata/RHSA-2023:0599
reference_id RHSA-2023:0599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0599
19
reference_url https://access.redhat.com/errata/RHSA-2023:0609
reference_id RHSA-2023:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0609
20
reference_url https://access.redhat.com/errata/RHSA-2023:0610
reference_id RHSA-2023:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0610
21
reference_url https://access.redhat.com/errata/RHSA-2023:0611
reference_id RHSA-2023:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0611
22
reference_url https://access.redhat.com/errata/RHSA-2023:0627
reference_id RHSA-2023:0627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0627
23
reference_url https://access.redhat.com/errata/RHSA-2023:0628
reference_id RHSA-2023:0628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0628
24
reference_url https://access.redhat.com/errata/RHSA-2023:0978
reference_id RHSA-2023:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0978
25
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
26
reference_url https://usn.ubuntu.com/5810-1/
reference_id USN-5810-1
reference_type
scores
url https://usn.ubuntu.com/5810-1/
27
reference_url https://usn.ubuntu.com/5810-3/
reference_id USN-5810-3
reference_type
scores
url https://usn.ubuntu.com/5810-3/
28
reference_url https://usn.ubuntu.com/5810-4/
reference_id USN-5810-4
reference_type
scores
url https://usn.ubuntu.com/5810-4/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2022-41903
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bkb-3m1h-m7fw
2
url VCID-415p-yw6x-mucy
vulnerability_id VCID-415p-yw6x-mucy
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24765.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24765
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39033
published_at 2026-04-21T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.3915
published_at 2026-04-04T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39128
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.3907
published_at 2026-04-07T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39125
published_at 2026-04-08T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39122
published_at 2026-04-18T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39152
published_at 2026-04-16T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39097
published_at 2026-04-13T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39116
published_at 2026-04-12T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39141
published_at 2026-04-09T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39153
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073414
reference_id 2073414
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073414
10
reference_url http://seclists.org/fulldisclosure/2022/May/31
reference_id 31
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url http://seclists.org/fulldisclosure/2022/May/31
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
reference_id 5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/
12
reference_url http://www.openwall.com/lists/oss-security/2022/04/12/7
reference_id 7
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url http://www.openwall.com/lists/oss-security/2022/04/12/7
13
reference_url https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
reference_id Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash
14
reference_url https://security.archlinux.org/AVG-2679
reference_id AVG-2679
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2679
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
reference_id BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/
reference_id DDI325LOO2XBDDKLINOAQJEG6MHAURZE
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE/
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/
reference_id DIKWISWUDFT2FAITYIA6372BVLH3OOOC
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIKWISWUDFT2FAITYIA6372BVLH3OOOC/
18
reference_url https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
reference_id git.txt-codeGITCEILINGDIRECTORIEScode
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode
19
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://security.gentoo.org/glsa/202312-15
20
reference_url https://support.apple.com/kb/HT213261
reference_id HT213261
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://support.apple.com/kb/HT213261
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/
reference_id HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVOLER2PIGMHPQMDGG4RDE2KZB74QLA2/
22
reference_url https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html
23
reference_url https://access.redhat.com/errata/RHSA-2023:2319
reference_id RHSA-2023:2319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2319
24
reference_url https://access.redhat.com/errata/RHSA-2023:2859
reference_id RHSA-2023:2859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2859
25
reference_url https://access.redhat.com/errata/RHSA-2024:0407
reference_id RHSA-2024:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0407
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
reference_id SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/
reference_id TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZG5CDUQ27OWTPC5MQOR4UASNXHWEZS/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/
reference_id UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDZRZAL7QULOB6V7MKT66MOMWJLBJPX4/
29
reference_url https://usn.ubuntu.com/5376-1/
reference_id USN-5376-1
reference_type
scores
url https://usn.ubuntu.com/5376-1/
30
reference_url https://usn.ubuntu.com/5376-2/
reference_id USN-5376-2
reference_type
scores
url https://usn.ubuntu.com/5376-2/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/
reference_id YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-16T17:47:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YROCMBWYFKRSS64PO6FUNM6L7LKBUKVW/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2022-24765
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-415p-yw6x-mucy
3
url VCID-6uub-fxap-pbfa
vulnerability_id VCID-6uub-fxap-pbfa
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23521.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23521.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23521
reference_id
reference_type
scores
0
value 0.12292
scoring_system epss
scoring_elements 0.93831
published_at 2026-04-02T12:55:00Z
1
value 0.12292
scoring_system epss
scoring_elements 0.93889
published_at 2026-04-21T12:55:00Z
2
value 0.12292
scoring_system epss
scoring_elements 0.9384
published_at 2026-04-04T12:55:00Z
3
value 0.12292
scoring_system epss
scoring_elements 0.93843
published_at 2026-04-07T12:55:00Z
4
value 0.12292
scoring_system epss
scoring_elements 0.93851
published_at 2026-04-08T12:55:00Z
5
value 0.12292
scoring_system epss
scoring_elements 0.93855
published_at 2026-04-09T12:55:00Z
6
value 0.12292
scoring_system epss
scoring_elements 0.9386
published_at 2026-04-13T12:55:00Z
7
value 0.12292
scoring_system epss
scoring_elements 0.93882
published_at 2026-04-16T12:55:00Z
8
value 0.12292
scoring_system epss
scoring_elements 0.93888
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23521
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
reference_id 1029114
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029114
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162055
reference_id 2162055
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162055
11
reference_url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_id 508386c6c5857b4faa2c3e491f422c98cc69ae76
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:25Z/
url https://github.com/git/git/commit/508386c6c5857b4faa2c3e491f422c98cc69ae76
12
reference_url https://github.com/git/git/security/advisories/GHSA-c738-c5qq-xg89
reference_id GHSA-c738-c5qq-xg89
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:25Z/
url https://github.com/git/git/security/advisories/GHSA-c738-c5qq-xg89
13
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-15T17:36:25Z/
url https://security.gentoo.org/glsa/202312-15
14
reference_url https://access.redhat.com/errata/RHSA-2023:0596
reference_id RHSA-2023:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0596
15
reference_url https://access.redhat.com/errata/RHSA-2023:0597
reference_id RHSA-2023:0597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0597
16
reference_url https://access.redhat.com/errata/RHSA-2023:0599
reference_id RHSA-2023:0599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0599
17
reference_url https://access.redhat.com/errata/RHSA-2023:0609
reference_id RHSA-2023:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0609
18
reference_url https://access.redhat.com/errata/RHSA-2023:0610
reference_id RHSA-2023:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0610
19
reference_url https://access.redhat.com/errata/RHSA-2023:0611
reference_id RHSA-2023:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0611
20
reference_url https://access.redhat.com/errata/RHSA-2023:0627
reference_id RHSA-2023:0627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0627
21
reference_url https://access.redhat.com/errata/RHSA-2023:0628
reference_id RHSA-2023:0628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0628
22
reference_url https://access.redhat.com/errata/RHSA-2023:0978
reference_id RHSA-2023:0978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0978
23
reference_url https://access.redhat.com/errata/RHSA-2023:1677
reference_id RHSA-2023:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1677
24
reference_url https://usn.ubuntu.com/5810-1/
reference_id USN-5810-1
reference_type
scores
url https://usn.ubuntu.com/5810-1/
25
reference_url https://usn.ubuntu.com/5810-3/
reference_id USN-5810-3
reference_type
scores
url https://usn.ubuntu.com/5810-3/
26
reference_url https://usn.ubuntu.com/5810-4/
reference_id USN-5810-4
reference_type
scores
url https://usn.ubuntu.com/5810-4/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2022-23521
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uub-fxap-pbfa
4
url VCID-9ngj-sk96-kyh5
vulnerability_id VCID-9ngj-sk96-kyh5
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29007.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29007
reference_id
reference_type
scores
0
value 0.00825
scoring_system epss
scoring_elements 0.74413
published_at 2026-04-02T12:55:00Z
1
value 0.00825
scoring_system epss
scoring_elements 0.7444
published_at 2026-04-04T12:55:00Z
2
value 0.00825
scoring_system epss
scoring_elements 0.74415
published_at 2026-04-07T12:55:00Z
3
value 0.00825
scoring_system epss
scoring_elements 0.74447
published_at 2026-04-08T12:55:00Z
4
value 0.00825
scoring_system epss
scoring_elements 0.74464
published_at 2026-04-09T12:55:00Z
5
value 0.00825
scoring_system epss
scoring_elements 0.74495
published_at 2026-04-16T12:55:00Z
6
value 0.00825
scoring_system epss
scoring_elements 0.74502
published_at 2026-04-18T12:55:00Z
7
value 0.00825
scoring_system epss
scoring_elements 0.74486
published_at 2026-04-11T12:55:00Z
8
value 0.00825
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-12T12:55:00Z
9
value 0.00825
scoring_system epss
scoring_elements 0.74457
published_at 2026-04-13T12:55:00Z
10
value 0.009
scoring_system epss
scoring_elements 0.75687
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29007
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
reference_id 1034835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188338
reference_id 2188338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188338
6
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
7
reference_url https://access.redhat.com/errata/RHSA-2023:3192
reference_id RHSA-2023:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3192
8
reference_url https://access.redhat.com/errata/RHSA-2023:3243
reference_id RHSA-2023:3243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3243
9
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
10
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
11
reference_url https://access.redhat.com/errata/RHSA-2023:3247
reference_id RHSA-2023:3247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3247
12
reference_url https://access.redhat.com/errata/RHSA-2023:3248
reference_id RHSA-2023:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3248
13
reference_url https://access.redhat.com/errata/RHSA-2023:3263
reference_id RHSA-2023:3263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3263
14
reference_url https://access.redhat.com/errata/RHSA-2023:3280
reference_id RHSA-2023:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3280
15
reference_url https://access.redhat.com/errata/RHSA-2023:3382
reference_id RHSA-2023:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3382
16
reference_url https://usn.ubuntu.com/6050-1/
reference_id USN-6050-1
reference_type
scores
url https://usn.ubuntu.com/6050-1/
17
reference_url https://usn.ubuntu.com/6050-2/
reference_id USN-6050-2
reference_type
scores
url https://usn.ubuntu.com/6050-2/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2023-29007
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ngj-sk96-kyh5
5
url VCID-bn42-x9ez-f7ee
vulnerability_id VCID-bn42-x9ez-f7ee
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39253.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39253.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39253
reference_id
reference_type
scores
0
value 0.02579
scoring_system epss
scoring_elements 0.85588
published_at 2026-04-21T12:55:00Z
1
value 0.02794
scoring_system epss
scoring_elements 0.8604
published_at 2026-04-02T12:55:00Z
2
value 0.02794
scoring_system epss
scoring_elements 0.86057
published_at 2026-04-07T12:55:00Z
3
value 0.02794
scoring_system epss
scoring_elements 0.86076
published_at 2026-04-08T12:55:00Z
4
value 0.02794
scoring_system epss
scoring_elements 0.86087
published_at 2026-04-09T12:55:00Z
5
value 0.02794
scoring_system epss
scoring_elements 0.86101
published_at 2026-04-11T12:55:00Z
6
value 0.02794
scoring_system epss
scoring_elements 0.86098
published_at 2026-04-12T12:55:00Z
7
value 0.02794
scoring_system epss
scoring_elements 0.86094
published_at 2026-04-13T12:55:00Z
8
value 0.02794
scoring_system epss
scoring_elements 0.86111
published_at 2026-04-16T12:55:00Z
9
value 0.02794
scoring_system epss
scoring_elements 0.86116
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39253
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022046
reference_id 1022046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022046
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137422
reference_id 2137422
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2137422
11
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
12
reference_url https://access.redhat.com/errata/RHSA-2023:2319
reference_id RHSA-2023:2319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2319
13
reference_url https://access.redhat.com/errata/RHSA-2023:2859
reference_id RHSA-2023:2859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2859
14
reference_url https://access.redhat.com/errata/RHSA-2024:0407
reference_id RHSA-2024:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0407
15
reference_url https://usn.ubuntu.com/5686-1/
reference_id USN-5686-1
reference_type
scores
url https://usn.ubuntu.com/5686-1/
16
reference_url https://usn.ubuntu.com/5686-3/
reference_id USN-5686-3
reference_type
scores
url https://usn.ubuntu.com/5686-3/
17
reference_url https://usn.ubuntu.com/5686-4/
reference_id USN-5686-4
reference_type
scores
url https://usn.ubuntu.com/5686-4/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2022-39253
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bn42-x9ez-f7ee
6
url VCID-h8as-wpes-q7eq
vulnerability_id VCID-h8as-wpes-q7eq
summary A vulnerability has been found in libgit2 which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29187.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29187
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21615
published_at 2026-04-21T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.2164
published_at 2026-04-16T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21647
published_at 2026-04-18T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21788
published_at 2026-04-02T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21841
published_at 2026-04-04T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21594
published_at 2026-04-07T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.2167
published_at 2026-04-08T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-09T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21738
published_at 2026-04-11T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21699
published_at 2026-04-12T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21642
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014848
reference_id 1014848
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014848
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107439
reference_id 2107439
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107439
11
reference_url https://security.archlinux.org/AVG-2778
reference_id AVG-2778
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2778
12
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
13
reference_url https://security.gentoo.org/glsa/202401-17
reference_id GLSA-202401-17
reference_type
scores
url https://security.gentoo.org/glsa/202401-17
14
reference_url https://access.redhat.com/errata/RHSA-2023:2319
reference_id RHSA-2023:2319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2319
15
reference_url https://access.redhat.com/errata/RHSA-2023:2859
reference_id RHSA-2023:2859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2859
16
reference_url https://access.redhat.com/errata/RHSA-2024:0407
reference_id RHSA-2024:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0407
17
reference_url https://usn.ubuntu.com/5511-1/
reference_id USN-5511-1
reference_type
scores
url https://usn.ubuntu.com/5511-1/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2022-29187
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h8as-wpes-q7eq
7
url VCID-hr22-p62n-hqd9
vulnerability_id VCID-hr22-p62n-hqd9
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25652.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25652
reference_id
reference_type
scores
0
value 0.01801
scoring_system epss
scoring_elements 0.82742
published_at 2026-04-02T12:55:00Z
1
value 0.01801
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-18T12:55:00Z
2
value 0.01801
scoring_system epss
scoring_elements 0.82831
published_at 2026-04-16T12:55:00Z
3
value 0.01801
scoring_system epss
scoring_elements 0.82792
published_at 2026-04-13T12:55:00Z
4
value 0.01801
scoring_system epss
scoring_elements 0.82797
published_at 2026-04-12T12:55:00Z
5
value 0.01801
scoring_system epss
scoring_elements 0.82802
published_at 2026-04-11T12:55:00Z
6
value 0.01801
scoring_system epss
scoring_elements 0.82785
published_at 2026-04-09T12:55:00Z
7
value 0.01801
scoring_system epss
scoring_elements 0.82779
published_at 2026-04-08T12:55:00Z
8
value 0.01801
scoring_system epss
scoring_elements 0.82756
published_at 2026-04-04T12:55:00Z
9
value 0.01801
scoring_system epss
scoring_elements 0.82753
published_at 2026-04-07T12:55:00Z
10
value 0.03387
scoring_system epss
scoring_elements 0.87411
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25652
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
reference_id 1034835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
5
reference_url https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902
reference_id 18e2b1cfc80990719275d7b08e6e50f3e8cbc902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902
6
reference_url http://www.openwall.com/lists/oss-security/2023/04/25/2
reference_id 2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url http://www.openwall.com/lists/oss-security/2023/04/25/2
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188333
reference_id 2188333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188333
8
reference_url https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e
reference_id 668f2d53613ac8fd373926ebe219f2c29112d93e
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/
reference_id BSXOGVVBJLYX26IAYX6PJSYQB36BREWH
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/
10
reference_url https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx
reference_id GHSA-2hvf-7c8p-28fx
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx
11
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://security.gentoo.org/glsa/202312-15
12
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/
reference_id PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/
14
reference_url https://access.redhat.com/errata/RHSA-2023:3192
reference_id RHSA-2023:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3192
15
reference_url https://access.redhat.com/errata/RHSA-2023:3243
reference_id RHSA-2023:3243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3243
16
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
17
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
18
reference_url https://access.redhat.com/errata/RHSA-2023:3247
reference_id RHSA-2023:3247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3247
19
reference_url https://access.redhat.com/errata/RHSA-2023:3248
reference_id RHSA-2023:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3248
20
reference_url https://access.redhat.com/errata/RHSA-2023:3263
reference_id RHSA-2023:3263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3263
21
reference_url https://access.redhat.com/errata/RHSA-2023:3280
reference_id RHSA-2023:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3280
22
reference_url https://access.redhat.com/errata/RHSA-2023:3382
reference_id RHSA-2023:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3382
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/
reference_id RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/
24
reference_url https://usn.ubuntu.com/6050-1/
reference_id USN-6050-1
reference_type
scores
url https://usn.ubuntu.com/6050-1/
25
reference_url https://usn.ubuntu.com/6050-2/
reference_id USN-6050-2
reference_type
scores
url https://usn.ubuntu.com/6050-2/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/
reference_id YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2023-25652
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hr22-p62n-hqd9
8
url VCID-mhs7-a1hp-dqa3
vulnerability_id VCID-mhs7-a1hp-dqa3
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39260.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39260.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39260
reference_id
reference_type
scores
0
value 0.01274
scoring_system epss
scoring_elements 0.79489
published_at 2026-04-02T12:55:00Z
1
value 0.02232
scoring_system epss
scoring_elements 0.84499
published_at 2026-04-07T12:55:00Z
2
value 0.02232
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-08T12:55:00Z
3
value 0.02232
scoring_system epss
scoring_elements 0.84526
published_at 2026-04-09T12:55:00Z
4
value 0.02232
scoring_system epss
scoring_elements 0.84545
published_at 2026-04-11T12:55:00Z
5
value 0.02232
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-12T12:55:00Z
6
value 0.02232
scoring_system epss
scoring_elements 0.84535
published_at 2026-04-13T12:55:00Z
7
value 0.02232
scoring_system epss
scoring_elements 0.84556
published_at 2026-04-18T12:55:00Z
8
value 0.02232
scoring_system epss
scoring_elements 0.84557
published_at 2026-04-21T12:55:00Z
9
value 0.02232
scoring_system epss
scoring_elements 0.84497
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39260
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022046
reference_id 1022046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022046
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2137423
reference_id 2137423
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2137423
11
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
12
reference_url https://access.redhat.com/errata/RHSA-2023:2319
reference_id RHSA-2023:2319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2319
13
reference_url https://access.redhat.com/errata/RHSA-2023:2859
reference_id RHSA-2023:2859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2859
14
reference_url https://access.redhat.com/errata/RHSA-2024:0407
reference_id RHSA-2024:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0407
15
reference_url https://usn.ubuntu.com/5686-1/
reference_id USN-5686-1
reference_type
scores
url https://usn.ubuntu.com/5686-1/
16
reference_url https://usn.ubuntu.com/5686-2/
reference_id USN-5686-2
reference_type
scores
url https://usn.ubuntu.com/5686-2/
17
reference_url https://usn.ubuntu.com/5686-3/
reference_id USN-5686-3
reference_type
scores
url https://usn.ubuntu.com/5686-3/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2022-39260
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhs7-a1hp-dqa3
9
url VCID-usx6-t5ns-t3bb
vulnerability_id VCID-usx6-t5ns-t3bb
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25815.json
reference_id
reference_type
scores
0
value 2.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25815.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25815
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-02T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27713
published_at 2026-04-04T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27503
published_at 2026-04-07T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27571
published_at 2026-04-08T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27614
published_at 2026-04-09T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27619
published_at 2026-04-11T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27574
published_at 2026-04-12T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27518
published_at 2026-04-13T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27525
published_at 2026-04-16T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27498
published_at 2026-04-18T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27459
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
reference_id 1034835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188337
reference_id 2188337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188337
6
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
7
reference_url https://access.redhat.com/errata/RHSA-2023:3192
reference_id RHSA-2023:3192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3192
8
reference_url https://access.redhat.com/errata/RHSA-2023:3243
reference_id RHSA-2023:3243
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3243
9
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
10
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
11
reference_url https://access.redhat.com/errata/RHSA-2023:3247
reference_id RHSA-2023:3247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3247
12
reference_url https://access.redhat.com/errata/RHSA-2023:3248
reference_id RHSA-2023:3248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3248
13
reference_url https://access.redhat.com/errata/RHSA-2023:3280
reference_id RHSA-2023:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3280
14
reference_url https://access.redhat.com/errata/RHSA-2023:3382
reference_id RHSA-2023:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3382
15
reference_url https://usn.ubuntu.com/6050-1/
reference_id USN-6050-1
reference_type
scores
url https://usn.ubuntu.com/6050-1/
16
reference_url https://usn.ubuntu.com/7023-1/
reference_id USN-7023-1
reference_type
scores
url https://usn.ubuntu.com/7023-1/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2023-25815
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-usx6-t5ns-t3bb
10
url VCID-v84q-w7ye-c7d3
vulnerability_id VCID-v84q-w7ye-c7d3
summary Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22490.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22490
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.3707
published_at 2026-04-21T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39134
published_at 2026-04-12T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39115
published_at 2026-04-13T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39169
published_at 2026-04-16T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39139
published_at 2026-04-18T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39159
published_at 2026-04-09T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39171
published_at 2026-04-11T12:55:00Z
7
value 0.0029
scoring_system epss
scoring_elements 0.52391
published_at 2026-04-02T12:55:00Z
8
value 0.0029
scoring_system epss
scoring_elements 0.52419
published_at 2026-04-04T12:55:00Z
9
value 0.0029
scoring_system epss
scoring_elements 0.52384
published_at 2026-04-07T12:55:00Z
10
value 0.0029
scoring_system epss
scoring_elements 0.52437
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22490
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23946
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031310
reference_id 1031310
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031310
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2168160
reference_id 2168160
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2168160
7
reference_url https://security.gentoo.org/glsa/202312-15
reference_id GLSA-202312-15
reference_type
scores
url https://security.gentoo.org/glsa/202312-15
8
reference_url https://access.redhat.com/errata/RHSA-2023:3245
reference_id RHSA-2023:3245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3245
9
reference_url https://access.redhat.com/errata/RHSA-2023:3246
reference_id RHSA-2023:3246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3246
10
reference_url https://access.redhat.com/errata/RHSA-2024:0407
reference_id RHSA-2024:0407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0407
11
reference_url https://usn.ubuntu.com/5871-1/
reference_id USN-5871-1
reference_type
scores
url https://usn.ubuntu.com/5871-1/
12
reference_url https://usn.ubuntu.com/5871-2/
reference_id USN-5871-2
reference_type
scores
url https://usn.ubuntu.com/5871-2/
fixed_packages
0
url pkg:ebuild/dev-vcs/git@2.39.3
purl pkg:ebuild/dev-vcs/git@2.39.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3
aliases CVE-2023-22490
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v84q-w7ye-c7d3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-vcs/git@2.39.3