Filtered by vendor Gitblit
                        
                        Subscribe
                        
                        
                    
                    
                
                    Total
                    2 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 | 
|---|---|---|---|---|---|
| CVE-2022-31267 | 1 Gitblit | 1 Gitblit | 2022-06-07 | 7.5 HIGH | 9.8 CRITICAL | 
| Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext 'attacker@example.com\n\trole = "#admin"' value. | |||||
| CVE-2022-31268 | 1 Gitblit | 1 Gitblit | 2022-06-02 | 5.0 MEDIUM | 7.5 HIGH | 
| A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname). | |||||
