{"url":"http://public2.vulnerablecode.io/api/packages/1051779?format=json","purl":"pkg:deb/debian/git-lfs@3.3.0-1%2Bdeb12u1","type":"deb","namespace":"debian","name":"git-lfs","version":"3.3.0-1+deb12u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"3.6.1-1+deb13u1","latest_non_vulnerable_version":"3.7.1-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/25227?format=json","vulnerability_id":"VCID-3954-3k4u-xbhr","summary":"Git LFS may write to arbitrary files via crafted symlinks\n### Impact\n\nWhen populating a Git repository's working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS.\n\nGit LFS has resolved this problem by revising the `git lfs checkout` and `git lfs pull` commands so that they check for symbolic links in the same manner as performed by Git before writing to files in the working tree.  These commands now also remove existing files in the working tree before writing new files in their place.\n\nAs well, Git LFS has resolved a problem whereby the `git lfs checkout` and `git lfs pull` commands, when run in a bare repository, could write to files visible outside the repository.  While a specific and relatively unlikely set of conditions were required for this to occur, it is no longer possible under any circumstances.\n\n### Patches\n\nThis problem exists in all versions since 0.5.2 and is patched in v3.7.1.  All users should upgrade to v3.7.1.\n\n### Workarounds\n\nSupport for symlinks in Git may be disabled by setting the `core.symlinks` configuration option to `false`, after which further clones and fetches will not create symbolic links.  However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.\n\n### References\n\n- https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5\n- https://nvd.nist.gov/vuln/detail/CVE-2025-26625\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625\n- https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1\n- [git-lfs/git-lfs@5c11ffce9a](https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8)\n- [git-lfs/git-lfs@0cffe93176](https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396)\n- [git-lfs/git-lfs@d02bd13f02](https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615)\n\n### For more information\n\nIf there are any questions or comments about this advisory:\n* For general questions, start a discussion in the Git LFS [discussion forum](https://github.com/git-lfs/git-lfs/discussions).\n* For reports of additional vulnerabilities, please follow the Git LFS [security reporting policy](https://github.com/git-lfs/git-lfs/blob/main/SECURITY.md).","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26625.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-26625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26625","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11148","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1101","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11256","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11376","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1132","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11286","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11124","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11126","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11194","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-26625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/git-lfs/git-lfs","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/git-lfs/git-lfs"},{"reference_url":"https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-17T15:44:04Z/"}],"url":"https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396"},{"reference_url":"https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-17T15:44:04Z/"}],"url":"https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8"},{"reference_url":"https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-17T15:44:04Z/"}],"url":"https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615"},{"reference_url":"https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-17T15:44:04Z/"}],"url":"https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1"},{"reference_url":"https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-10-17T15:44:04Z/"}],"url":"https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-26625","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-26625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118339","reference_id":"1118339","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1118339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404720","reference_id":"2404720","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2404720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23648","reference_id":"RHSA-2025:23648","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23648"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23667","reference_id":"RHSA-2025:23667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23667"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23744","reference_id":"RHSA-2025:23744","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23744"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23745","reference_id":"RHSA-2025:23745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23927","reference_id":"RHSA-2025:23927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0199","reference_id":"RHSA-2026:0199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0203","reference_id":"RHSA-2026:0203","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0204","reference_id":"RHSA-2026:0204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0224","reference_id":"RHSA-2026:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0459","reference_id":"RHSA-2026:0459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0460","reference_id":"RHSA-2026:0460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0465","reference_id":"RHSA-2026:0465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:0472","reference_id":"RHSA-2026:0472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:0472"},{"reference_url":"https://usn.ubuntu.com/7977-1/","reference_id":"USN-7977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7977-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1089038?format=json","purl":"pkg:deb/debian/git-lfs@3.6.1-1%2Bdeb13u1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/git-lfs@3.6.1-1%252Bdeb13u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1055697?format=json","purl":"pkg:deb/debian/git-lfs@3.7.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/git-lfs@3.7.1-1"}],"aliases":["CVE-2025-26625","GHSA-6pvw-g552-53c5"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3954-3k4u-xbhr"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/25964?format=json","vulnerability_id":"VCID-a7r5-wv78-mbbt","summary":"Git LFS permits exfiltration of credentials via crafted HTTP URLs\n### Impact\n\nWhen Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host.  By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials.\n\n### Patches\n\nThis problem exists in all previous versions and is patched in v3.6.1.  All users should upgrade to v3.6.1.\n\n### Workarounds\n\nThere are no workarounds known at this time.\n\n### References\n\n* https://github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7\n* https://nvd.nist.gov/vuln/detail/CVE-2024-53263\n* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53263\n* https://github.com/git-lfs/git-lfs/releases/tag/v3.6.1\n* [git-lfs/git-lfs@0345b6f816](https://github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90)\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* For general questions, start a discussion in the Git LFS [discussion forum](https://github.com/git-lfs/git-lfs/discussions).\n* For reports of additional vulnerabilities, please follow the Git LFS [security reporting policy](https://github.com/git-lfs/git-lfs/blob/main/SECURITY.md).","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53263.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-53263.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53263","reference_id":"","reference_type":"","scores":[{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44762","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44693","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.4494","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44996","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44974","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44937","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.449","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-53263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53263"},{"reference_url":"https://github.com/git-lfs/git-lfs","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/git-lfs/git-lfs"},{"reference_url":"https://github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T04:55:25Z/"}],"url":"https://github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90"},{"reference_url":"https://github.com/git-lfs/git-lfs/releases/tag/v3.6.1","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T04:55:25Z/"}],"url":"https://github.com/git-lfs/git-lfs/releases/tag/v3.6.1"},{"reference_url":"https://github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T04:55:25Z/"}],"url":"https://github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00022.html","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00022.html"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53263","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53263"},{"reference_url":"https://pkg.go.dev/vuln/GO-2025-3390","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://pkg.go.dev/vuln/GO-2025-3390"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093048","reference_id":"1093048","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093048"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338002","reference_id":"2338002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0673","reference_id":"RHSA-2025:0673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0673"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0757","reference_id":"RHSA-2025:0757","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0757"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0758","reference_id":"RHSA-2025:0758","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0759","reference_id":"RHSA-2025:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0762","reference_id":"RHSA-2025:0762","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0762"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0765","reference_id":"RHSA-2025:0765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0825","reference_id":"RHSA-2025:0825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:0845","reference_id":"RHSA-2025:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:0845"},{"reference_url":"https://usn.ubuntu.com/7977-1/","reference_id":"USN-7977-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7977-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051779?format=json","purl":"pkg:deb/debian/git-lfs@3.3.0-1%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3954-3k4u-xbhr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/git-lfs@3.3.0-1%252Bdeb12u1"}],"aliases":["CVE-2024-53263","GHSA-q6r2-x2cc-vrp7"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a7r5-wv78-mbbt"}],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/git-lfs@3.3.0-1%252Bdeb12u1"}