Количество 7
Количество 7
BDU:2024-04480
Уязвимость библиотеки Python для взаимодействия с git-репозиториями gitpython, связанная с неправильной проверкой ввода, позволяющая нарушителю внедрить вредоносный удаленный URL-адрес в команду клонирования
CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execut ...
ROS-20240611-16
Уязвимость python3-GitPython
GHSA-hcpj-qp55-gfph
GitPython vulnerable to Remote Code Execution due to improper user input validation
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-04480 Уязвимость библиотеки Python для взаимодействия с git-репозиториями gitpython, связанная с неправильной проверкой ввода, позволяющая нарушителю внедрить вредоносный удаленный URL-адрес в команду клонирования | CVSS3: 9.8 | 71% Высокий | почти 3 года назад | |
CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | CVSS3: 8.1 | 71% Высокий | почти 3 года назад | |
CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | CVSS3: 9.8 | 71% Высокий | почти 3 года назад | |
CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | CVSS3: 8.1 | 71% Высокий | почти 3 года назад | |
CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execut ... | CVSS3: 8.1 | 71% Высокий | почти 3 года назад | |
ROS-20240611-16 Уязвимость python3-GitPython | CVSS3: 9.8 | 71% Высокий | больше 1 года назад | |
GHSA-hcpj-qp55-gfph GitPython vulnerable to Remote Code Execution due to improper user input validation | CVSS3: 8.1 | 71% Высокий | почти 3 года назад |
Уязвимостей на страницу