CVE-2015-8969
03.11.2016, 10:59
git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library.
Vendor | Product | Version |
---|---|---|
squareup | git-fastclone | 𝑥 < 1.0.5 |
𝑥
= Vulnerable software versions