Количество 7
Количество 7

CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
CVE-2022-24439
All versions of package gitpython are vulnerable to Remote Code Execut ...

ROS-20240611-16
Уязвимость python3-GitPython
GHSA-hcpj-qp55-gfph
GitPython vulnerable to Remote Code Execution due to improper user input validation

BDU:2024-04480
Уязвимость библиотеки Python для взаимодействия с git-репозиториями gitpython, связанная с неправильной проверкой ввода, позволяющая нарушителю внедрить вредоносный удаленный URL-адрес в команду клонирования
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | CVSS3: 8.1 | 70% Средний | больше 2 лет назад |
![]() | CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | CVSS3: 9.8 | 70% Средний | больше 2 лет назад |
![]() | CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | CVSS3: 8.1 | 70% Средний | больше 2 лет назад |
CVE-2022-24439 All versions of package gitpython are vulnerable to Remote Code Execut ... | CVSS3: 8.1 | 70% Средний | больше 2 лет назад | |
![]() | ROS-20240611-16 Уязвимость python3-GitPython | CVSS3: 9.8 | 70% Средний | около 1 года назад |
GHSA-hcpj-qp55-gfph GitPython vulnerable to Remote Code Execution due to improper user input validation | CVSS3: 8.1 | 70% Средний | больше 2 лет назад | |
![]() | BDU:2024-04480 Уязвимость библиотеки Python для взаимодействия с git-репозиториями gitpython, связанная с неправильной проверкой ввода, позволяющая нарушителю внедрить вредоносный удаленный URL-адрес в команду клонирования | CVSS3: 9.8 | 70% Средний | больше 2 лет назад |
Уязвимостей на страницу