{"id":"CVE-2016-3105","details":"The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.","aliases":["GHSA-49cw-434h-qc57","PYSEC-2016-28"],"modified":"2026-03-15T22:21:59.817169Z","published":"2016-05-09T20:59:03.837Z","related":["MGASA-2016-0172","SUSE-SU-2016:1442-1","SUSE-SU-2016:1443-1","openSUSE-SU-2024:10070-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00082.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/90536"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255"},{"type":"WEB","url":"https://selenic.com/hg/rev/a56296f55a5e"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3570"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-19"},{"type":"ADVISORY","url":"https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.8_.2F_3.8.1_.282016-5-1.29"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.7.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-3105.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}