cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-21697,https://securityvulnerability.io/vulnerability/CVE-2024-21697,"{""{\""text\"":\""High Sev RCE Vulnerability Affects Sourcetree for Mac and Windows\"",\""icon\"":\""⚠️\""}"",""{\""text\"":\""Upgrade to Latest Version to Mitigate Risk\"",\""icon\"":\""🔄\""}""}","A Remote Code Execution vulnerability exists in Sourcetree versions 4.2.8 for Mac and 3.4.19 for Windows, which enables an unauthenticated attacker to execute arbitrary code on the affected systems. This vulnerability has substantial implications, as it significantly compromises the confidentiality, integrity, and availability of the affected products. User interaction is required, which increases the risk of exploitation in environments where users may unknowingly initiate the attack vector. Atlassian strongly advises all users to upgrade to patched versions: Sourcetree for Mac should be updated to version 4.2.9 or higher, while Sourcetree for Windows should be updated to version 3.4.20 or higher to mitigate potential risks.",Atlassian,"Sourcetree For Mac,Sourcetree For Windows",8.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-11-19T19:00:00.635Z,0 CVE-2018-20234,https://securityvulnerability.io/vulnerability/CVE-2018-20234,,There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.,Atlassian,Sourcetree For Mac OS,8.8,HIGH,0.0044200001284480095,false,false,false,false,,false,false,2019-03-08T18:29:00.000Z,0 CVE-2018-13396,https://securityvulnerability.io/vulnerability/CVE-2018-13396,,There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.,Atlassian,Sourcetree For Mac OS,8.8,HIGH,0.0008500000112690032,false,false,false,false,,false,false,2018-11-05T22:29:00.000Z,0 CVE-2018-13385,https://securityvulnerability.io/vulnerability/CVE-2018-13385,,There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability.,Atlassian,Sourcetree For Mac OS,9.8,CRITICAL,0.003650000086054206,false,false,false,false,,false,false,2018-07-24T13:29:00.000Z,0 CVE-2017-14592,https://securityvulnerability.io/vulnerability/CVE-2017-14592,,"Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.",Atlassian,Sourcetree For Mac OS,8.8,HIGH,0.00267999991774559,false,false,false,false,,false,false,2018-01-24T00:00:00.000Z,0