cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-21697,https://securityvulnerability.io/vulnerability/CVE-2024-21697,"{""{\""text\"":\""High Sev RCE Vulnerability Affects Sourcetree for Mac and Windows\"",\""icon\"":\""⚠️\""}"",""{\""text\"":\""Upgrade to Latest Version to Mitigate Risk\"",\""icon\"":\""🔄\""}""}","A Remote Code Execution vulnerability exists in Sourcetree versions 4.2.8 for Mac and 3.4.19 for Windows, which enables an unauthenticated attacker to execute arbitrary code on the affected systems. This vulnerability has substantial implications, as it significantly compromises the confidentiality, integrity, and availability of the affected products. User interaction is required, which increases the risk of exploitation in environments where users may unknowingly initiate the attack vector. Atlassian strongly advises all users to upgrade to patched versions: Sourcetree for Mac should be updated to version 4.2.9 or higher, while Sourcetree for Windows should be updated to version 3.4.20 or higher to mitigate potential risks.",Atlassian,"Sourcetree For Mac,Sourcetree For Windows",8.8,HIGH,0.0010100000072270632,false,,false,false,false,,,false,false,,2024-11-19T19:00:00.635Z,0 CVE-2019-11582,https://securityvulnerability.io/vulnerability/CVE-2019-11582,Argument Injection Vulnerability in Atlassian Sourcetree for Windows,"An argument injection vulnerability exists in Atlassian Sourcetree for Windows's URI handlers, enabling remote attackers to execute arbitrary code on the affected systems. By leveraging specially crafted URIs, attackers can potentially gain control of the impacted environment. All versions of Sourcetree for Windows prior to 3.1.3 are susceptible, highlighting the importance of upgrading to mitigate the risk.",Atlassian,Sourcetree For Windows,8.8,HIGH,0.002839999971911311,false,,false,false,false,,,false,false,,2019-06-14T14:29:00.000Z,0 CVE-2018-20235,https://securityvulnerability.io/vulnerability/CVE-2018-20235,Argument Injection Vulnerability in Atlassian Sourcetree for Windows,"An argument injection vulnerability exists in Atlassian Sourcetree for Windows versions prior to 3.0.15. This flaw allows remote attackers, who have permission to commit to linked Mercurial repositories, to inject malicious arguments via filenames. Consequently, this can lead to unauthorized code execution on the target system, posing significant security risks for affected installations.",Atlassian,Sourcetree For Windows,8.8,HIGH,0.00749000022187829,false,,false,false,false,,,false,false,,2019-03-08T18:29:00.000Z,0 CVE-2018-20236,https://securityvulnerability.io/vulnerability/CVE-2018-20236,Command Injection Vulnerability in Sourcetree for Windows,"A command injection vulnerability exists in Sourcetree for Windows that permits remote attackers to send crafted URIs, leading to arbitrary code execution. Affected users running versions from 0.5a up to 3.0.9 are at risk, as the vulnerability arises from improper URI handling within the application. Malicious actors can exploit this flaw by delivering specially designed URIs to victims, which Sourcetree processes, potentially compromising the victim's system.",Atlassian,Sourcetree For Windows,8.8,HIGH,0.015110000036656857,false,,false,false,false,,,false,false,,2019-03-08T18:29:00.000Z,0 CVE-2018-13397,https://securityvulnerability.io/vulnerability/CVE-2018-13397,,There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.,Atlassian,Sourcetree For Windows,8.8,HIGH,0.0008500000112690032,false,,false,false,false,,,false,false,,2018-11-05T22:29:00.000Z,0 CVE-2018-13386,https://securityvulnerability.io/vulnerability/CVE-2018-13386,,There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability.,Atlassian,Sourcetree For Windows,8.1,HIGH,0.0018599999602884054,false,,false,false,false,,,false,false,,2018-07-24T13:29:00.000Z,0 CVE-2018-5226,https://securityvulnerability.io/vulnerability/CVE-2018-5226,,There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability.,Atlassian,Sourcetree Windows,8.8,HIGH,0.0010100000072270632,false,,false,false,false,,,false,false,,2018-04-25T00:00:00.000Z,0 CVE-2017-14593,https://securityvulnerability.io/vulnerability/CVE-2017-14593,,"Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability",Atlassian,Sourcetree For Windows,8.8,HIGH,0.00267999991774559,false,,false,false,false,,,false,false,,2018-01-26T02:29:00.000Z,0