Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
git git vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2020-5260
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provide...
Git Git
Git-scm Git
Debian Debian Linux 8.0
Canonical Ubuntu Linux 16.04
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Fedoraproject Fedora 30
Opensuse Leap 15.1
Canonical Ubuntu Linux 19.10
Fedoraproject Fedora 31
Fedoraproject Fedora 32
2 Github repositories
8.1
CVSSv3
CVE-2022-36881
Jenkins Git client Plugin 3.11.0 and previous versions does not perform SSH host key verification when connecting to Git repositories via SSH, enabling man-in-the-middle attacks.
Jenkins Git Client
5.4
CVSSv3
CVE-2022-29040
Jenkins Git Parameter Plugin 0.9.15 and previous versions does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Jenkins Git Parameter
NA
CVE-2010-0394
PyGIT.py in the Trac Git plugin (trac-git) prior to 0.0.20080710-3+lenny1 and prior to 0.0.20090320-1 on Debian GNU/Linux, when enabled in Trac, allows remote malicious users to execute arbitrary commands via shell metacharacters in a crafted HTTP query that is used to generate a...
Nanosleep Trac-git
6.5
CVSSv3
CVE-2024-23899
Jenkins Git server Plugin 99.va_0826a_b_cdfa_d and previous versions does not disable a feature of its command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing attackers with Overall/Read permission to ...
Jenkins Git Server
8.8
CVSSv3
CVE-2015-8968
git-fastclone prior to 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an un...
Squareup Git-fastclone
9.8
CVSSv3
CVE-2015-8969
git-fastclone prior to 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library.
Squareup Git-fastclone
5.4
CVSSv3
CVE-2020-2238
Jenkins Git Parameter Plugin 0.9.12 and previous versions does not escape the repository field on the 'Build with Parameters' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins Git Parameter
8.8
CVSSv3
CVE-2016-7793
sociomantic-tsunami git-hub prior to 0.10.3 allows remote malicious users to execute arbitrary code via a crafted repository URL.
Sociomantic Git-hub
9.8
CVSSv3
CVE-2016-7794
sociomantic-tsunami git-hub prior to 0.10.3 allows remote malicious users to execute arbitrary code via a crafted repository name.
Sociomantic Git-hub
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
7
8
9
10
NEXT »