CVE-2019-1387
- EPSS 2.79%
- Published 18.12.2019 21:15:13
- Last modified 21.11.2024 04:36:36
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names...
CVE-2019-19604
- EPSS 1.34%
- Published 11.12.2019 00:15:13
- Last modified 21.11.2024 04:35:02
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a ma...
CVE-2018-19486
- EPSS 0.69%
- Published 23.11.2018 08:29:00
- Last modified 21.11.2024 03:58:00
Git before 2.19.2 on Linux and UNIX executes commands from the current working directory (as if '.' were at the end of $PATH) in certain cases involving the run_command() API and run-command.c, because there was a dangerous change from execvp to exec...
CVE-2018-17456
- EPSS 70.7%
- Published 06.10.2018 14:29:00
- Last modified 21.11.2024 03:54:27
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has ...
CVE-2018-11235
- EPSS 41.72%
- Published 30.05.2018 04:29:00
- Last modified 21.11.2024 03:42:57
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that ...
CVE-2018-11233
- EPSS 0.29%
- Published 30.05.2018 04:29:00
- Last modified 21.11.2024 03:42:57
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
CVE-2018-1000021
- EPSS 0.31%
- Published 09.02.2018 23:29:00
- Last modified 21.11.2024 03:39:26
GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious ...
CVE-2017-15298
- EPSS 0.43%
- Published 14.10.2017 22:29:00
- Last modified 20.04.2025 01:37:25
Git through 2.14.2 mishandles layers of tree objects, which allows remote attackers to cause a denial of service (memory consumption) via a crafted repository, aka a Git bomb. This can also have an impact of disk consumption; however, an affected pro...
CVE-2017-1000117
- EPSS 70.59%
- Published 05.10.2017 01:29:04
- Last modified 20.04.2025 01:37:25
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of ...
- EPSS 6.97%
- Published 29.09.2017 01:34:50
- Last modified 20.04.2025 01:37:25
Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacha...