Show filters
59 Total Results
Displaying 31-40 of 59
Sort by:
Attacker Value
Unknown

CVE-2021-44685

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
Git-it through 4.4.0 allows OS command injection at the Branches Aren't Just For Birds challenge step. During the verification process, it attempts to run the reflog command followed by the current branch name (which is not sanitized for execution).
Attacker Value
Unknown

CVE-2021-32673

Disclosure Date: June 08, 2021 (last updated February 22, 2025)
reg-keygen-git-hash-plugin is a reg-suit plugin to detect the snapshot key to be compare with using Git commit hash. reg-keygen-git-hash-plugin through and including 0.10.15 allow remote attackers to execute of arbitrary commands. Upgrade to version 0.10.16 or later to resolve this issue.
Attacker Value
Unknown

CVE-2021-28955

Disclosure Date: March 22, 2021 (last updated February 22, 2025)
git-bug before 0.7.2 has an Uncontrolled Search Path Element. It will execute git.bat from the current directory in certain PATH situations (most often seen on Windows).
Attacker Value
Unknown

CVE-2020-28490

Disclosure Date: February 18, 2021 (last updated February 22, 2025)
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
Attacker Value
Unknown

CVE-2021-3190

Disclosure Date: January 26, 2021 (last updated February 22, 2025)
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag.
Attacker Value
Unknown

CVE-2021-21237

Disclosure Date: January 15, 2021 (last updated February 22, 2025)
Git LFS is a command line extension for managing large files with Git. On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator. Other than avoiding untrusted repositories or using a different operating system, there is no workaround. This is fixed in v2.13.2.
Attacker Value
Unknown

CVE-2021-3028

Disclosure Date: January 13, 2021 (last updated February 22, 2025)
git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution.
Attacker Value
Unknown

CVE-2020-15272

Disclosure Date: October 26, 2020 (last updated February 22, 2025)
In the git-tag-annotation-action (open source GitHub Action) before version 1.0.1, an attacker can execute arbitrary (*) shell commands if they can control the value of [the `tag` input] or manage to alter the value of [the `GITHUB_REF` environment variable]. The problem has been patched in version 1.0.1. If you don't use the `tag` input you are most likely safe. The `GITHUB_REF` environment variable is protected by the GitHub Actions environment so attacks from there should be impossible. If you must use the `tag` input and cannot upgrade to `> 1.0.0` make sure that the value is not controlled by another Action.
Attacker Value
Unknown

CVE-2020-7630

Disclosure Date: April 02, 2020 (last updated February 21, 2025)
git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument.
Attacker Value
Unknown

CVE-2020-7619

Disclosure Date: April 02, 2020 (last updated February 21, 2025)
get-git-data through 1.3.1 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the arguments provided to get-git-data.