Show filters
59 Total Results
Displaying 11-20 of 59
Sort by:
Attacker Value
Unknown

CVE-2023-23618

Disclosure Date: February 14, 2023 (last updated November 08, 2023)
Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some social engineering to trick users into running untrusted code. A patch is available in version 2.39.2. As a workaround, avoid using `gitk` (or Git GUI's "Visualize History" functionality) in clones of untrusted repositories.
Attacker Value
Unknown

CVE-2023-22743

Disclosure Date: February 14, 2023 (last updated October 08, 2023)
Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, by carefully crafting DLL and putting into a subdirectory of a specific name living next to the Git for Windows installer, Windows can be tricked into side-loading said DLL. This potentially allows users with local write access to place malicious payloads in a location where automated upgrades might run the Git for Windows installer with elevation. Version 2.39.2 contains a patch for this issue. Some workarounds are available. Never leave untrusted files in the Downloads folder or its sub-folders before executing the Git for Windows installer, or move the installer into a different directory before executing it.
Attacker Value
Unknown

CVE-2022-25860

Disclosure Date: January 26, 2023 (last updated November 08, 2023)
Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
Attacker Value
Unknown

CVE-2022-47318

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.
Attacker Value
Unknown

CVE-2022-46648

Disclosure Date: January 17, 2023 (last updated October 08, 2023)
ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318.
Attacker Value
Unknown

CVE-2022-4817

Disclosure Date: December 28, 2022 (last updated October 08, 2023)
A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988.
Attacker Value
Unknown

CVE-2022-25912

Disclosure Date: December 06, 2022 (last updated October 08, 2023)
The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
Attacker Value
Unknown

CVE-2020-28422

Disclosure Date: July 25, 2022 (last updated October 07, 2023)
All versions of package git-archive are vulnerable to Command Injection via the exports function.
Attacker Value
Unknown

CVE-2022-25900

Disclosure Date: July 01, 2022 (last updated October 07, 2023)
All versions of package git-clone are vulnerable to Command Injection due to insecure usage of the --upload-pack feature of git.
Attacker Value
Unknown

CVE-2021-40899

Disclosure Date: June 27, 2022 (last updated October 07, 2023)
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in repo-git-downloader v0.1.1 when downloading crafted invalid git repositories.