Important git security update. Fix for crafted URL credential lea
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | git security update | 21 Apr 202000:00 | – | oraclelinux |
![]() | git security update | 22 Apr 202000:00 | – | oraclelinux |
![]() | About the security content of Xcode 11.4.1 - Apple Support | 16 Apr 202007:04 | – | apple |
![]() | About the security content of Xcode 11.4.1 | 15 Apr 202000:00 | – | apple |
![]() | CentOS 7 : git (RHSA-2020:1511) | 1 May 202000:00 | – | nessus |
![]() | EulerOS 2.0 SP8 : git (EulerOS-SA-2020-1503) | 20 Apr 202000:00 | – | nessus |
![]() | Oracle Linux 7 : git (ELSA-2020-1511) | 24 Apr 202000:00 | – | nessus |
![]() | Amazon Linux AMI : git (ALAS-2020-1357) | 17 Apr 202000:00 | – | nessus |
![]() | Fedora 31 : git (2020-cdef88bb89) | 20 Apr 202000:00 | – | nessus |
![]() | SUSE SLED15 / SLES15 Security Update : git (SUSE-SU-2020:0991-1) | 15 Apr 202000:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | aarch64 | git | 2.18.2-2.el8_1 | git-2.18.2-2.el8_1.aarch64.rpm |
RedHat | 8 | ppc64le | git | 2.18.2-2.el8_1 | git-2.18.2-2.el8_1.ppc64le.rpm |
RedHat | 8 | s390x | git | 2.18.2-2.el8_1 | git-2.18.2-2.el8_1.s390x.rpm |
RedHat | 8 | x86_64 | git | 2.18.2-2.el8_1 | git-2.18.2-2.el8_1.x86_64.rpm |
RedHat | 8 | noarch | git-all | 2.18.2-2.el8_1 | git-all-2.18.2-2.el8_1.noarch.rpm |
RedHat | 8 | aarch64 | git-core | 2.18.2-2.el8_1 | git-core-2.18.2-2.el8_1.aarch64.rpm |
RedHat | 8 | ppc64le | git-core | 2.18.2-2.el8_1 | git-core-2.18.2-2.el8_1.ppc64le.rpm |
RedHat | 8 | s390x | git-core | 2.18.2-2.el8_1 | git-core-2.18.2-2.el8_1.s390x.rpm |
RedHat | 8 | x86_64 | git-core | 2.18.2-2.el8_1 | git-core-2.18.2-2.el8_1.x86_64.rpm |
RedHat | 8 | aarch64 | git-core-debuginfo | 2.18.2-2.el8_1 | git-core-debuginfo-2.18.2-2.el8_1.aarch64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo