Page 7 of 99 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. • http://seclists.org/fulldisclosure/2022/Nov/1 http://www.openwall.com/lists/oss-security/2022/07/14/1 https://github.blog/2022-04-12-git-security-vulnerability-announced https://github.com/git/git/security/advisories/GHSA-j342-m5hw-rr3v https://lists.debian.org/debian-lts-announce/2022/12/msg00025.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDI325LOO2XBDDKLINOAQJEG6MHAURZE https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro • CWE-282: Improper Ownership Management CWE-427: Uncontrolled Search Path Element •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 2

All versions of package git-clone are vulnerable to Command Injection due to insecure usage of the --upload-pack feature of git. Todas las versiones del paquete git-clone son vulnerables a una inyección de comandos debido al uso inseguro de la función --upload-pack de git • https://gist.github.com/lirantal/9441f3a1212728476f7a6caa4acb2ccc https://snyk.io/vuln/SNYK-JS-GITCLONE-2434308 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in repo-git-downloader v0.1.1 when downloading crafted invalid git repositories. Se ha detectado una vulnerabilidad de Denegación de Servicio por Expresiones Regulares (ReDOS) en repo-git-downloader versión v0.1.1, cuando son descargados repositorios git no válidos diseñados • https://github.com/yetingli/SaveResults/blob/main/js/repo-git-downloader.js • CWE-1333: Inefficient Regular Expression Complexity •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

All versions of package git-promise are vulnerable to Command Injection due to an inappropriate fix of a prior [vulnerability](https://security.snyk.io/vuln/SNYK-JS-GITPROMISE-567476) in this package. **Note:** Please note that the vulnerability will not be fixed. The README file was updated with a warning regarding this issue. Todas las versiones del paquete git-promise son vulnerables a una inyección de comandos debido a una corrección inapropiada de una [vulnerabilidad] anterior (https://security.snyk.io/vuln/SNYK-JS-GITPROMISE-567476) en este paquete. **Nota:** Tenga en cuenta que la vulnerabilidad no será corregida. • https://gist.github.com/lirantal/9da1fceb32f5279eb76a5fc1cb9707dd https://snyk.io/vuln/SNYK-JS-GITPROMISE-2434310 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection. El paquete git-pull-or-clone versiones anteriores a 2.0.2, es vulnerable a una inyección de comandos debido al uso de la función --upload-pack de git, que también es compatible con git clone. La fuente incluye el uso de la API spawn() del proceso hijo seguro. • https://gist.github.com/lirantal/327e9dd32686991b5a1fa6341aac2e7b https://github.com/feross/git-pull-or-clone/commit/f9ce092be13cc32e685dfa26e7705e9c6e3108a3 https://snyk.io/vuln/SNYK-JS-GITPULLORCLONE-2434307 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •