Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-53158

Опубликовано: 28 июл. 2025
Источник: debian
EPSS Низкий

Описание

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rust-gitoxideitppackage

EPSS

Процентиль: 2%
0.00014
Низкий

Связанные уязвимости

CVSS3: 4.1
ubuntu
6 месяцев назад

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.

CVSS3: 4.1
redhat
6 месяцев назад

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.

CVSS3: 4.1
nvd
6 месяцев назад

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.

CVSS3: 4.1
msrc
5 месяцев назад

The gix-transport crate before 0.36.1 for Rust allows command execution via the "gix clone 'ssh://-oProxyCommand=open$IFS" substring. NOTE: this was discovered before CVE-2024-32884, a similar vulnerability (involving a username field) that is more difficult to exploit.

CVSS3: 4.1
github
больше 2 лет назад

gix-transport code execution vulnerability

EPSS

Процентиль: 2%
0.00014
Низкий