Browse all 23 CVE security advisories affecting git. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Git serves as the foundational distributed version control system for software development, enabling collaborative code management across global teams. Despite its robust architecture, the software has historically been susceptible to critical vulnerabilities, including remote code execution, arbitrary file deletion, and privilege escalation attacks. Recent records indicate twenty-three distinct Common Vulnerabilities and Exposures, highlighting persistent risks in parsing logic and credential handling. Notable incidents have involved crafted repositories triggering code execution or exposing sensitive data through symlink attacks. These flaws often stem from complex interactions between the core engine and external tools or user inputs. Security researchers emphasize that while Git itself is stable, improper configuration or outdated versions can expose infrastructure to significant threats. Continuous patching and strict input validation remain essential for maintaining integrity in modern development pipelines, ensuring that the tool’s widespread adoption does not become a vector for systemic compromise.
This page lists every published CVE security advisory associated with git. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.