Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gitlist vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2014-4511
Gitlist prior to 0.5.0 allows remote malicious users to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.
Gitlist Gitlist 0.2
Gitlist Gitlist 0.1
Gitlist Gitlist
Gitlist Gitlist 0.3
2 EDB exploits
1 Github repository
7.5
CVSSv2
CVE-2018-1000533
klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vul...
Gitlist Gitlist
7.5
CVSSv2
CVE-2013-7392
Gitlist allows remote malicious users to execute arbitrary commands via shell metacharacters in a file name to Source/.
Gitlist Gitlist -
2 EDB exploits
6.8
CVSSv2
CVE-2014-5023
Repository.php in Gitter, as used in Gitlist, allows remote attackers with commit privileges to execute arbitrary commands via shell metacharacters in a branch name, as demonstrated by a "git checkout -b" command.
Gitlist Gitlist -
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
hardcoded
arbitrary code
CVE-2024-2404
CVE-2024-21111
CVE-2024-28627
CVE-2024-4073
information disclosure
CVE-2024-32780
CVE-2024-4040
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started