Логотип exploitDog
bind:"CVE-2022-39253" OR bind:"CVE-2022-24765" OR bind:"CVE-2022-29187" OR bind:"CVE-2022-39260"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-39253" OR bind:"CVE-2022-24765" OR bind:"CVE-2022-29187" OR bind:"CVE-2022-39260"

Количество 38

Количество 38

oracle-oval логотип

ELSA-2023-2859

около 2 лет назад

ELSA-2023-2859: git security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-2319

около 2 лет назад

ELSA-2023-2319: git security and bug fix update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4271-1

больше 2 лет назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3931-1

больше 2 лет назад

Security update for git

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0418-1

больше 2 лет назад

Security update for git

EPSS: Низкий
ubuntu логотип

CVE-2022-39253

больше 2 лет назад

Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects...

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2022-39253

больше 2 лет назад

Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2022-39253

больше 2 лет назад

Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` d

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2022-39253

больше 2 лет назад

GitHub: CVE-2022-39253 Local clone optimization dereferences symbolic links by default

EPSS: Низкий
debian логотип

CVE-2022-39253

больше 2 лет назад

Git is an open source, scalable, distributed revision control system. ...

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3494-1

больше 2 лет назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3283-1

почти 3 года назад

Security update for libgit2

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3495-1

больше 2 лет назад

Security update for libgit2

EPSS: Низкий
fstec логотип

BDU:2023-06647

больше 2 лет назад

Уязвимость распределенной системы контроля версий Git для Windows, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2022-24765

около 3 лет назад

Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ...

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2022-24765

около 3 лет назад

Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ...

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2022-24765

около 3 лет назад

Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access fro

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2022-24765

около 3 лет назад

GitHub: Uncontrolled search for the Git directory in Git for Windows

EPSS: Низкий
debian логотип

CVE-2022-24765

около 3 лет назад

Git for Windows is a fork of Git containing Windows-specific patches. ...

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1484-1

около 3 лет назад

Security update for git

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-2859

ELSA-2023-2859: git security and bug fix update (MODERATE)

около 2 лет назад
oracle-oval логотип
ELSA-2023-2319

ELSA-2023-2319: git security and bug fix update (MODERATE)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4271-1

Security update for git

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3931-1

Security update for git

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0418-1

Security update for git

больше 2 лет назад
ubuntu логотип
CVE-2022-39253

Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects...

CVSS3: 5.5
2%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-39253

Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects...

CVSS3: 5.5
2%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-39253

Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` d

CVSS3: 5.5
2%
Низкий
больше 2 лет назад
msrc логотип
CVE-2022-39253

GitHub: CVE-2022-39253 Local clone optimization dereferences symbolic links by default

2%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-39253

Git is an open source, scalable, distributed revision control system. ...

CVSS3: 5.5
2%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3494-1

Security update for libgit2

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3283-1

Security update for libgit2

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:3495-1

Security update for libgit2

больше 2 лет назад
fstec логотип
BDU:2023-06647

Уязвимость распределенной системы контроля версий Git для Windows, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 5.5
2%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-24765

Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ...

CVSS3: 6
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-24765

Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ...

CVSS3: 7.8
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-24765

Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access fro

CVSS3: 6
0%
Низкий
около 3 лет назад
msrc логотип
CVE-2022-24765

GitHub: Uncontrolled search for the Git directory in Git for Windows

0%
Низкий
около 3 лет назад
debian логотип
CVE-2022-24765

Git for Windows is a fork of Git containing Windows-specific patches. ...

CVSS3: 6
0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:1484-1

Security update for git

0%
Низкий
около 3 лет назад

Уязвимостей на страницу