Lookup for vulnerable packages by Package URL.

GET /api/packages/923215?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "git",
    "version": "1:2.39.5-0+deb12u1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1:2.39.5-0+deb12u2",
    "latest_non_vulnerable_version": "1:2.53.0-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59055?format=api",
            "vulnerability_id": "VCID-9ngj-sk96-kyh5",
            "summary": "Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29007.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29007.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7218",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74413",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7444",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74415",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74464",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74486",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74457",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74495",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00825",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74502",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75687",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75727",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-29007"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835",
                    "reference_id": "1034835",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188338",
                    "reference_id": "2188338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188338"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202312-15",
                    "reference_id": "GLSA-202312-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202312-15"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3192",
                    "reference_id": "RHSA-2023:3192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3243",
                    "reference_id": "RHSA-2023:3243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3245",
                    "reference_id": "RHSA-2023:3245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3246",
                    "reference_id": "RHSA-2023:3246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3247",
                    "reference_id": "RHSA-2023:3247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3248",
                    "reference_id": "RHSA-2023:3248",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3248"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3263",
                    "reference_id": "RHSA-2023:3263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3263"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3280",
                    "reference_id": "RHSA-2023:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3382",
                    "reference_id": "RHSA-2023:3382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3382"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6050-1/",
                    "reference_id": "USN-6050-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6050-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6050-2/",
                    "reference_id": "USN-6050-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6050-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923187?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8kg-z578-kbdu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923204?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923216?format=api",
                    "purl": "pkg:deb/debian/git@1:2.40.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.40.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-29007"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ngj-sk96-kyh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76363?format=api",
            "vulnerability_id": "VCID-bkt1-jmy5-gbbf",
            "summary": "git: symlink bypass",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32021.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32021.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05763",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05592",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05616",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05587",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05577",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0557",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05518",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05527",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05692",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05727",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05519",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05555",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05554",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32021"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160",
                    "reference_id": "1071160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/14/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T20:29:23Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/14/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280484",
                    "reference_id": "2280484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280484"
                },
                {
                    "reference_url": "https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7",
                    "reference_id": "GHSA-mvxm-9j2h-qjx7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T20:29:23Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T20:29:23Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4083",
                    "reference_id": "RHSA-2024:4083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4084",
                    "reference_id": "RHSA-2024:4084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4368",
                    "reference_id": "RHSA-2024:4368",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4368"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/",
                    "reference_id": "S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-11T20:29:23Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6793-1/",
                    "reference_id": "USN-6793-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6793-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7023-1/",
                    "reference_id": "USN-7023-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7023-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923187?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8kg-z578-kbdu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923204?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923217?format=api",
                    "purl": "pkg:deb/debian/git@1:2.45.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.45.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-32021"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkt1-jmy5-gbbf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76361?format=api",
            "vulnerability_id": "VCID-e33d-r9kx-aucw",
            "summary": "git: additional local RCE",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32465.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32465.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35891",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36301",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36334",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36168",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36218",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36236",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36241",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36179",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36221",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36205",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36154",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35923",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32465"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160",
                    "reference_id": "1071160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/14/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:24:08Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/14/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280446",
                    "reference_id": "2280446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280446"
                },
                {
                    "reference_url": "https://github.com/git/git/commit/7b70e9efb18c2cc3f219af399bd384c5801ba1d7",
                    "reference_id": "7b70e9efb18c2cc3f219af399bd384c5801ba1d7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:24:08Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/commit/7b70e9efb18c2cc3f219af399bd384c5801ba1d7"
                },
                {
                    "reference_url": "https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4",
                    "reference_id": "GHSA-vm9j-46j9-qvq4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:24:08Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4"
                },
                {
                    "reference_url": "https://git-scm.com/docs/git-clone",
                    "reference_id": "git-clone",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:24:08Z/"
                        }
                    ],
                    "url": "https://git-scm.com/docs/git-clone"
                },
                {
                    "reference_url": "https://git-scm.com/docs/git#_security",
                    "reference_id": "git#_security",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:24:08Z/"
                        }
                    ],
                    "url": "https://git-scm.com/docs/git#_security"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:24:08Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4083",
                    "reference_id": "RHSA-2024:4083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4084",
                    "reference_id": "RHSA-2024:4084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4368",
                    "reference_id": "RHSA-2024:4368",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4368"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/",
                    "reference_id": "S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T14:24:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6793-1/",
                    "reference_id": "USN-6793-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6793-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7023-1/",
                    "reference_id": "USN-7023-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7023-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923187?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8kg-z578-kbdu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923204?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923217?format=api",
                    "purl": "pkg:deb/debian/git@1:2.45.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.45.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-32465"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e33d-r9kx-aucw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59053?format=api",
            "vulnerability_id": "VCID-hr22-p62n-hqd9",
            "summary": "Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25652.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25652.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82742",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82753",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82779",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82756",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8283",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82831",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82797",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82802",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01801",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82785",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87427",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03387",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87411",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87738",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835",
                    "reference_id": "1034835",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835"
                },
                {
                    "reference_url": "https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902",
                    "reference_id": "18e2b1cfc80990719275d7b08e6e50f3e8cbc902",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/commit/18e2b1cfc80990719275d7b08e6e50f3e8cbc902"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/04/25/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/04/25/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188333",
                    "reference_id": "2188333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188333"
                },
                {
                    "reference_url": "https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e",
                    "reference_id": "668f2d53613ac8fd373926ebe219f2c29112d93e",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/commit/668f2d53613ac8fd373926ebe219f2c29112d93e"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/",
                    "reference_id": "BSXOGVVBJLYX26IAYX6PJSYQB36BREWH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BSXOGVVBJLYX26IAYX6PJSYQB36BREWH/"
                },
                {
                    "reference_url": "https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx",
                    "reference_id": "GHSA-2hvf-7c8p-28fx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/security/advisories/GHSA-2hvf-7c8p-28fx"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202312-15",
                    "reference_id": "GLSA-202312-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202312-15"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/",
                    "reference_id": "PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PI7FZ4NNR5S5J5K6AMVQBH2JFP6NE4L7/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3192",
                    "reference_id": "RHSA-2023:3192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3243",
                    "reference_id": "RHSA-2023:3243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3245",
                    "reference_id": "RHSA-2023:3245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3246",
                    "reference_id": "RHSA-2023:3246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3247",
                    "reference_id": "RHSA-2023:3247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3248",
                    "reference_id": "RHSA-2023:3248",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3248"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3263",
                    "reference_id": "RHSA-2023:3263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3263"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3280",
                    "reference_id": "RHSA-2023:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3382",
                    "reference_id": "RHSA-2023:3382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3382"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/",
                    "reference_id": "RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RKOXOAZ42HLXHXTW6JZI4L5DAIYDTYCU/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6050-1/",
                    "reference_id": "USN-6050-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6050-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6050-2/",
                    "reference_id": "USN-6050-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6050-2/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/",
                    "reference_id": "YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-05T19:56:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YFZWGQKB6MM5MNF2DLFTD7KS2KWPICKL/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923187?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8kg-z578-kbdu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923204?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923216?format=api",
                    "purl": "pkg:deb/debian/git@1:2.40.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.40.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-25652"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hr22-p62n-hqd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76362?format=api",
            "vulnerability_id": "VCID-k8kg-z578-kbdu",
            "summary": "git: insecure hardlinks",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32020.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32020.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37321",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37692",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37717",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37596",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37648",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37661",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37674",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37641",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37613",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3766",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37577",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37341",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32020",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32020"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160",
                    "reference_id": "1071160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160"
                },
                {
                    "reference_url": "https://github.com/git/git/commit/1204e1a824c34071019fe106348eaa6d88f9528d",
                    "reference_id": "1204e1a824c34071019fe106348eaa6d88f9528d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:32:40Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/commit/1204e1a824c34071019fe106348eaa6d88f9528d"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/14/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:32:40Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/14/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280466",
                    "reference_id": "2280466",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280466"
                },
                {
                    "reference_url": "https://github.com/git/git/commit/9e65df5eab274bf74c7b570107aacd1303a1e703",
                    "reference_id": "9e65df5eab274bf74c7b570107aacd1303a1e703",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:32:40Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/commit/9e65df5eab274bf74c7b570107aacd1303a1e703"
                },
                {
                    "reference_url": "https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj",
                    "reference_id": "GHSA-5rfh-556j-fhgj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:32:40Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4083",
                    "reference_id": "RHSA-2024:4083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4084",
                    "reference_id": "RHSA-2024:4084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4368",
                    "reference_id": "RHSA-2024:4368",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4368"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/",
                    "reference_id": "S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-15T14:32:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6793-1/",
                    "reference_id": "USN-6793-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6793-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7023-1/",
                    "reference_id": "USN-7023-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7023-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923217?format=api",
                    "purl": "pkg:deb/debian/git@1:2.45.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.45.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-32020"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kg-z578-kbdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76360?format=api",
            "vulnerability_id": "VCID-rq4n-gfwv-uqbb",
            "summary": "git: RCE while cloning local repos",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32004.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32004.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.852",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85138",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85153",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8515",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85147",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85168",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85169",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85191",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85623",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85667",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85648",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85641",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160",
                    "reference_id": "1071160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/14/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/14/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280428",
                    "reference_id": "2280428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280428"
                },
                {
                    "reference_url": "https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8",
                    "reference_id": "f4aa8c8bb11dae6e769cd930565173808cbb69c8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8"
                },
                {
                    "reference_url": "https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389",
                    "reference_id": "GHSA-xfc6-vwr8-r389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389"
                },
                {
                    "reference_url": "https://git-scm.com/docs/git-clone",
                    "reference_id": "git-clone",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/"
                        }
                    ],
                    "url": "https://git-scm.com/docs/git-clone"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4083",
                    "reference_id": "RHSA-2024:4083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4084",
                    "reference_id": "RHSA-2024:4084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4368",
                    "reference_id": "RHSA-2024:4368",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4368"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4579",
                    "reference_id": "RHSA-2024:4579",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4579"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6027",
                    "reference_id": "RHSA-2024:6027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6027"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6028",
                    "reference_id": "RHSA-2024:6028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6610",
                    "reference_id": "RHSA-2024:6610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7701",
                    "reference_id": "RHSA-2024:7701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7701"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/",
                    "reference_id": "S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-15T17:59:29Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6793-1/",
                    "reference_id": "USN-6793-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6793-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7023-1/",
                    "reference_id": "USN-7023-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7023-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923187?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8kg-z578-kbdu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923204?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923217?format=api",
                    "purl": "pkg:deb/debian/git@1:2.45.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.45.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-32004"
            ],
            "risk_score": 3.7,
            "exploitability": "0.5",
            "weighted_severity": "7.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rq4n-gfwv-uqbb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59054?format=api",
            "vulnerability_id": "VCID-usx6-t5ns-t3bb",
            "summary": "Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25815.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25815.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27675",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27503",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27571",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27614",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27619",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27574",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27518",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27525",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27498",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27459",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27412",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27309",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-25815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835",
                    "reference_id": "1034835",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034835"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188337",
                    "reference_id": "2188337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188337"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202312-15",
                    "reference_id": "GLSA-202312-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202312-15"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3192",
                    "reference_id": "RHSA-2023:3192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3243",
                    "reference_id": "RHSA-2023:3243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3245",
                    "reference_id": "RHSA-2023:3245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3246",
                    "reference_id": "RHSA-2023:3246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3247",
                    "reference_id": "RHSA-2023:3247",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3247"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3248",
                    "reference_id": "RHSA-2023:3248",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3248"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3280",
                    "reference_id": "RHSA-2023:3280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3382",
                    "reference_id": "RHSA-2023:3382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3382"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6050-1/",
                    "reference_id": "USN-6050-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6050-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7023-1/",
                    "reference_id": "USN-7023-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7023-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923187?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8kg-z578-kbdu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923204?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923216?format=api",
                    "purl": "pkg:deb/debian/git@1:2.40.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.40.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-25815"
            ],
            "risk_score": 1.0,
            "exploitability": "0.5",
            "weighted_severity": "2.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-usx6-t5ns-t3bb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76359?format=api",
            "vulnerability_id": "VCID-uszr-cr35-r7gr",
            "summary": "git: Recursive clones RCE",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-32002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99132",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99115",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99118",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99122",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99123",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99125",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99126",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.80377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99131",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.8064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99143",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-32002"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32002"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160",
                    "reference_id": "1071160",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071160"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/14/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-29T14:18:00Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/05/14/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280421",
                    "reference_id": "2280421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280421"
                },
                {
                    "reference_url": "https://github.com/git/git/commit/97065761333fd62db1912d81b489db938d8c991d",
                    "reference_id": "97065761333fd62db1912d81b489db938d8c991d",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-29T14:18:00Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/commit/97065761333fd62db1912d81b489db938d8c991d"
                },
                {
                    "reference_url": "https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv",
                    "reference_id": "GHSA-8h77-4q3w-gfgv",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-29T14:18:00Z/"
                        }
                    ],
                    "url": "https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv"
                },
                {
                    "reference_url": "https://git-scm.com/docs/git-clone#Documentation/git-clone.txt---recurse-submodulesltpathspecgt",
                    "reference_id": "git-clone.txt---recurse-submodulesltpathspecgt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-29T14:18:00Z/"
                        }
                    ],
                    "url": "https://git-scm.com/docs/git-clone#Documentation/git-clone.txt---recurse-submodulesltpathspecgt"
                },
                {
                    "reference_url": "https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks",
                    "reference_id": "git-config.txt-coresymlinks",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-29T14:18:00Z/"
                        }
                    ],
                    "url": "https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-29T14:18:00Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4083",
                    "reference_id": "RHSA-2024:4083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4084",
                    "reference_id": "RHSA-2024:4084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4368",
                    "reference_id": "RHSA-2024:4368",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4368"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4579",
                    "reference_id": "RHSA-2024:4579",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4579"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6027",
                    "reference_id": "RHSA-2024:6027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6027"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6028",
                    "reference_id": "RHSA-2024:6028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6610",
                    "reference_id": "RHSA-2024:6610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6610"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/",
                    "reference_id": "S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-29T14:18:00Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6793-1/",
                    "reference_id": "USN-6793-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6793-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6793-2/",
                    "reference_id": "USN-6793-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6793-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7023-1/",
                    "reference_id": "USN-7023-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7023-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923187?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k8kg-z578-kbdu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923204?format=api",
                    "purl": "pkg:deb/debian/git@1:2.30.2-1%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.30.2-1%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923215?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923185?format=api",
                    "purl": "pkg:deb/debian/git@1:2.39.5-0%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923217?format=api",
                    "purl": "pkg:deb/debian/git@1:2.45.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.45.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923189?format=api",
                    "purl": "pkg:deb/debian/git@1:2.47.3-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.47.3-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/923188?format=api",
                    "purl": "pkg:deb/debian/git@1:2.53.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.53.0-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-32002"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uszr-cr35-r7gr"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/git@1:2.39.5-0%252Bdeb12u1%3Fdistro=trixie"
}