Metrics
Affected Vendors & Products
Fri, 14 Feb 2025 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:advanced_cluster_security:4.4::el8 |
Thu, 13 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat advanced Cluster Security Redhat enterprise Linux Redhat openshift Redhat openshift Builds Redhat rhel Eus Redhat trusted Profile Analyzer |
|
CPEs | cpe:/a:redhat:advanced_cluster_security:4.5::el8 cpe:/a:redhat:advanced_cluster_security:4.6::el8 cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:openshift:4.17::el9 cpe:/a:redhat:openshift_builds:1.1::el9 cpe:/a:redhat:openshift_builds:1.2::el9 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:trusted_profile_analyzer:1.2::el9 |
|
Vendors & Products |
Redhat
Redhat advanced Cluster Security Redhat enterprise Linux Redhat openshift Redhat openshift Builds Redhat rhel Eus Redhat trusted Profile Analyzer |
Tue, 07 Jan 2025 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 06 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Mon, 06 Jan 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0. | |
Title | go-git has an Argument Injection via the URL field | |
Weaknesses | CWE-88 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-06T16:45:02.671Z
Reserved: 2024-12-29T03:00:24.713Z
Link: CVE-2025-21613

Updated: 2025-01-06T16:44:56.937Z

Status : Received
Published: 2025-01-06T17:15:47.043
Modified: 2025-01-06T17:15:47.043
Link: CVE-2025-21613
