|ID||CVSS||Summary||Last (major) update||Published|
klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request
|26-06-2018 - 12:29||26-06-2018 - 12:29|
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stat
|24-07-2014 - 01:01||22-07-2014 - 10:55|
Repository.php in Gitter, as used in Gitlist, allows remote attackers with commit privileges to execute arbitrary commands via shell metacharacters in a branch name, as demonstrated by a "git checkout -b" command.
|22-07-2014 - 11:20||22-07-2014 - 10:55|
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.
|22-07-2014 - 11:14||22-07-2014 - 10:55|