Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/python-git@0?distro=trixie
Typedeb
Namespacedebian
Namepython-git
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.1.14-1
Latest_non_vulnerable_version3.1.46-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-qf8a-r6sz-qqf7
vulnerability_id VCID-qf8a-r6sz-qqf7
summary GitPython is a python library used to interact with Git repositories. When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment. GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. There is no fix currently available for windows users, however there are a few mitigations. 1: Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). 2: Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. 3: Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. 4: Resolve the executable manually by only looking into the `PATH` environment variable.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40590.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40590
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58907
published_at 2026-04-21T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58905
published_at 2026-04-08T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58929
published_at 2026-04-18T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58924
published_at 2026-04-16T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58891
published_at 2026-04-13T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.58928
published_at 2026-04-11T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58911
published_at 2026-04-12T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.58853
published_at 2026-04-07T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-04T12:55:00Z
9
value 0.00371
scoring_system epss
scoring_elements 0.58863
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40590
2
reference_url https://docs.python.org/3/library/subprocess.html#popen-constructor
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-02T14:04:30Z/
url https://docs.python.org/3/library/subprocess.html#popen-constructor
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/gitpython-developers/GitPython
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gitpython-developers/GitPython
5
reference_url https://github.com/gitpython-developers/GitPython/commit/8b75434e2c8a082cdeb4971cc6f0ee2bafec45bc
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gitpython-developers/GitPython/commit/8b75434e2c8a082cdeb4971cc6f0ee2bafec45bc
6
reference_url https://github.com/gitpython-developers/GitPython/issues/1635
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gitpython-developers/GitPython/issues/1635
7
reference_url https://github.com/gitpython-developers/GitPython/pull/1636
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gitpython-developers/GitPython/pull/1636
8
reference_url https://github.com/gitpython-developers/GitPython/releases/tag/3.1.33
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gitpython-developers/GitPython/releases/tag/3.1.33
9
reference_url https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-02T14:04:30Z/
url https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-wfm5-v35h-vwf4
10
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-161.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2023-161.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235871
reference_id 2235871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235871
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-40590
reference_id CVE-2023-40590
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-40590
13
reference_url https://github.com/advisories/GHSA-wfm5-v35h-vwf4
reference_id GHSA-wfm5-v35h-vwf4
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-wfm5-v35h-vwf4
fixed_packages
0
url pkg:deb/debian/python-git@0?distro=trixie
purl pkg:deb/debian/python-git@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@0%3Fdistro=trixie
1
url pkg:deb/debian/python-git@3.1.14-1?distro=trixie
purl pkg:deb/debian/python-git@3.1.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.14-1%3Fdistro=trixie
2
url pkg:deb/debian/python-git@3.1.30-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/python-git@3.1.30-1%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.30-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/python-git@3.1.44-1?distro=trixie
purl pkg:deb/debian/python-git@3.1.44-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.44-1%3Fdistro=trixie
4
url pkg:deb/debian/python-git@3.1.46-1?distro=trixie
purl pkg:deb/debian/python-git@3.1.46-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.46-1%3Fdistro=trixie
aliases CVE-2023-40590, GHSA-wfm5-v35h-vwf4, PYSEC-2023-161
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qf8a-r6sz-qqf7
1
url VCID-y786-mwkd-u7ha
vulnerability_id VCID-y786-mwkd-u7ha
summary GitPython is a python library used to interact with Git repositories. There is an incomplete fix for CVE-2023-40590. On Windows, GitPython uses an untrusted search path if it uses a shell to run `git`, as well as when it runs `bash.exe` to interpret hooks. If either of those features are used on Windows, a malicious `git.exe` or `bash.exe` may be run from an untrusted repository. This issue has been patched in version 3.1.41.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-22190
reference_id
reference_type
scores
0
value 0.00353
scoring_system epss
scoring_elements 0.57755
published_at 2026-04-08T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57725
published_at 2026-04-04T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57732
published_at 2026-04-13T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57751
published_at 2026-04-12T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.577
published_at 2026-04-07T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57703
published_at 2026-04-02T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.57772
published_at 2026-04-11T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.57757
published_at 2026-04-09T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.57735
published_at 2026-04-21T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57758
published_at 2026-04-18T12:55:00Z
10
value 0.00353
scoring_system epss
scoring_elements 0.57762
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-22190
1
reference_url https://github.com/gitpython-developers/GitPython
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/gitpython-developers/GitPython
2
reference_url https://github.com/gitpython-developers/GitPython/commit/ef3192cc414f2fd9978908454f6fd95243784c7f
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-03-25T18:06:43Z/
url https://github.com/gitpython-developers/GitPython/commit/ef3192cc414f2fd9978908454f6fd95243784c7f
3
reference_url https://github.com/gitpython-developers/GitPython/pull/1792
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-03-25T18:06:43Z/
url https://github.com/gitpython-developers/GitPython/pull/1792
4
reference_url https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-03-25T18:06:43Z/
url https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2024-4.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/gitpython/PYSEC-2024-4.yaml
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-22190
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-22190
7
reference_url https://github.com/advisories/GHSA-2mqj-m65w-jghx
reference_id GHSA-2mqj-m65w-jghx
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2mqj-m65w-jghx
fixed_packages
0
url pkg:deb/debian/python-git@0?distro=trixie
purl pkg:deb/debian/python-git@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@0%3Fdistro=trixie
1
url pkg:deb/debian/python-git@3.1.14-1?distro=trixie
purl pkg:deb/debian/python-git@3.1.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.14-1%3Fdistro=trixie
2
url pkg:deb/debian/python-git@3.1.30-1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/python-git@3.1.30-1%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.30-1%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/python-git@3.1.44-1?distro=trixie
purl pkg:deb/debian/python-git@3.1.44-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.44-1%3Fdistro=trixie
4
url pkg:deb/debian/python-git@3.1.46-1?distro=trixie
purl pkg:deb/debian/python-git@3.1.46-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@3.1.46-1%3Fdistro=trixie
aliases CVE-2024-22190, GHSA-2mqj-m65w-jghx, PYSEC-2024-4
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y786-mwkd-u7ha
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/python-git@0%3Fdistro=trixie