
CVE-2018-3785
https://notcve.org/view.php?id=CVE-2018-3785
17 Aug 2018 — A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter. Una inyección de comandos en git-dummy-commit v1.3.0 permite ejecutar comandos a nivel de sistema operativo debido a un parámetro no escapado. • https://hackerone.com/reports/341710 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2018-10857
https://notcve.org/view.php?id=CVE-2018-10857
16 Jul 2018 — git-annex is vulnerable to a private data exposure and exfiltration attack. It could expose the content of files located outside the git-annex repository, or content from a private web server on localhost or the LAN. git-annex es vulnerable a un ataque de exposición y exfiltración de datos privados. Podría exponer el contenido de los archivos situados fuera del repositorio git-annex o contenido de un servidor web privado en localhost o la LAN. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10857 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2018-10859
https://notcve.org/view.php?id=CVE-2018-10859
16 Jul 2018 — git-annex is vulnerable to an Information Exposure when decrypting files. A malicious server for a special remote could trick git-annex into decrypting a file that was encrypted to the user's gpg key. This attack could be used to expose encrypted data that was never stored in git-annex git-annex es vulnerable a una exposición de información al descifrar archivos. Un servidor malicioso para un remoto especial podría engañar a git-annex para que descifre un archivo cifrado en la clave gpg del usuario. Este at... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10859 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2017-1000451
https://notcve.org/view.php?id=CVE-2017-1000451
02 Jan 2018 — fs-git is a file system like api for git repository. The fs-git version 1.0.1 module relies on child_process.exec, however, the buildCommand method used to construct exec strings does not properly sanitize data and is vulnerable to command injection across all methods that use it and call exec. fs-git es un sistema de archivos tipo api para git repository. El módulo fs-git, en su versión 1.0.1, depende de child_process.exec. Sin embargo, el método buildCommand empleado para construir cadenas exec no sanea d... • https://nodesecurity.io/advisories/360 •

CVE-2017-17831 – SourceTree Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-17831
21 Dec 2017 — GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a "url =" line in a .lfsconfig file within a repository. GitHub Git LFS en versiones anteriores a la 2.1.1 permite que los atacantes remotos ejecuten comandos arbitrarios mediante una URL ssh con un carácter guión inicial en el nombre del host, que se encuentra en una línea "url =" en un archivo .lfsconfig dentro de un repositorio. Sourcetree for macOS v... • http://blog.recurity-labs.com/2017-08-10/scm-vulns • CWE-20: Improper Input Validation •

CVE-2017-12976
https://notcve.org/view.php?id=CVE-2017-12976
20 Aug 2017 — git-annex before 6.20170818 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, as demonstrated by an ssh://-eProxyCommand= URL, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-1000116, and CVE-2017-1000117. git-annex en versiones anteriores a la 6.20170818 permite que atacantes remotos ejecuten comandos arbitrarios mediante una URL ssh con un carácter de guion en el nombre de host, tal y como demuestra ssh://-eProxyCommand= URL, un... • http://source.git-annex.branchable.com/?p=source.git%3Ba=blob%3Bf=doc/bugs/dashed_ssh_hostname_security_hole.mdwn • CWE-20: Improper Input Validation •

CVE-2016-9274
https://notcve.org/view.php?id=CVE-2016-9274
11 Nov 2016 — Untrusted search path vulnerability in Git 1.x for Windows allows local users to gain privileges via a Trojan horse git.exe file in the current working directory. NOTE: 2.x is unaffected. Vulnerabilidad de ruta de acceso no confiable en Git 1.x para Windows permite a los usuarios locales obtener privilegios a través de un archivo caballo de Troya git.exe en el directorio de trabajo actual. NOTA: 2.x no se ve afectada. • http://www.securityfocus.com/bid/94289 • CWE-426: Untrusted Search Path •

CVE-2015-7545 – git: arbitrary code execution via crafted URLs
https://notcve.org/view.php?id=CVE-2015-7545
16 Dec 2015 — The (1) git-remote-ext and (2) unspecified other remote helper programs in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x before 2.6.1 do not properly restrict the allowed protocols, which might allow remote attackers to execute arbitrary code via a URL in a (a) .gitmodules file or (b) unknown other sources in a submodule. El (1) git-remote-ext y (2) otros programas de ayuda remotos no especificados en Git en versiones anteriores a 2.3.10, 2.4.x en versiones anteriores a 2.4.10, 2.5.x... • https://github.com/avuserow/bug-free-chainsaw • CWE-20: Improper Input Validation CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-284: Improper Access Control •

CVE-2015-7082 – Apple Security Advisory 2015-12-08-6
https://notcve.org/view.php?id=CVE-2015-7082
10 Dec 2015 — Multiple unspecified vulnerabilities in Git before 2.5.4, as used in Apple Xcode before 7.2, have unknown impact and attack vectors. NOTE: this CVE is associated only with Xcode use cases. Múltiples vulnerabilidades no especificadas en Git en versiones anteriores a 2.5.4, como se utiliza en Apple Xcode en versiones anteriores a 7.2, tienen impacto y vectores de ataque desconocidos. NOTA: ésta CVE esta asociada solo con casos de uso Xcode. Xcode 7.2 is now available and addresses four vulnerabilities. • http://lists.apple.com/archives/security-announce/2015/Dec/msg00004.html •