Page 4 of 49 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 2

All versions of package git-clone are vulnerable to Command Injection due to insecure usage of the --upload-pack feature of git. Todas las versiones del paquete git-clone son vulnerables a una inyección de comandos debido al uso inseguro de la función --upload-pack de git • https://gist.github.com/lirantal/9441f3a1212728476f7a6caa4acb2ccc https://snyk.io/vuln/SNYK-JS-GITCLONE-2434308 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in repo-git-downloader v0.1.1 when downloading crafted invalid git repositories. Se ha detectado una vulnerabilidad de Denegación de Servicio por Expresiones Regulares (ReDOS) en repo-git-downloader versión v0.1.1, cuando son descargados repositorios git no válidos diseñados • https://github.com/yetingli/SaveResults/blob/main/js/repo-git-downloader.js • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

All versions of package git-promise are vulnerable to Command Injection due to an inappropriate fix of a prior [vulnerability](https://security.snyk.io/vuln/SNYK-JS-GITPROMISE-567476) in this package. **Note:** Please note that the vulnerability will not be fixed. The README file was updated with a warning regarding this issue. Todas las versiones del paquete git-promise son vulnerables a una inyección de comandos debido a una corrección inapropiada de una [vulnerabilidad] anterior (https://security.snyk.io/vuln/SNYK-JS-GITPROMISE-567476) en este paquete. **Nota:** Tenga en cuenta que la vulnerabilidad no será corregida. • https://gist.github.com/lirantal/9da1fceb32f5279eb76a5fc1cb9707dd https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection. El paquete git-pull-or-clone versiones anteriores a 2.0.2, es vulnerable a una inyección de comandos debido al uso de la función --upload-pack de git, que también es compatible con git clone. La fuente incluye el uso de la API spawn() del proceso hijo seguro. • https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b https://github.com/feross/git-pull-or-clone/commit/f9ce092be13cc32e685dfa26e7705e9c6e3108a3 https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. El paquete czproject/git-php versiones anteriores a 4.0.3, es vulnerable a una inyección de comandos por medio de una inyección de argumentos git. Cuando es llamado a la función isRemoteUrlReadable($url, array $refs = NULL), los parámetros url y refs son pasados al subcomando git ls-remote de forma que puedan establecerse flags adicionales. • https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733 https://github.com/czproject/git-php/releases/tag/v4.0.3 https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •