Количество 6
Количество 6
CVE-2022-25648
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CVE-2022-25648
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CVE-2022-25648
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
CVE-2022-25648
The package git before 1.11.0 are vulnerable to Command Injection via ...
GHSA-69p6-wvmq-27gg
Command injection in ruby-git
BDU:2024-02281
Уязвимость библиотеки Ruby/Git интерпретатора Ruby, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-25648 The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. | CVSS3: 8.1 | 2% Низкий | почти 4 года назад | |
CVE-2022-25648 The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. | CVSS3: 9.8 | 2% Низкий | почти 4 года назад | |
CVE-2022-25648 The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. | CVSS3: 8.1 | 2% Низкий | почти 4 года назад | |
CVE-2022-25648 The package git before 1.11.0 are vulnerable to Command Injection via ... | CVSS3: 8.1 | 2% Низкий | почти 4 года назад | |
GHSA-69p6-wvmq-27gg Command injection in ruby-git | CVSS3: 9.8 | 2% Низкий | почти 4 года назад | |
BDU:2024-02281 Уязвимость библиотеки Ruby/Git интерпретатора Ruby, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.1 | 2% Низкий | почти 4 года назад |
Уязвимостей на страницу