Количество 15
Количество 15

CVE-2022-24765
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ...

CVE-2022-24765
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ...

CVE-2022-24765
Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access fro

CVE-2022-24765
GitHub: Uncontrolled search for the Git directory in Git for Windows
CVE-2022-24765
Git for Windows is a fork of Git containing Windows-specific patches. ...

SUSE-SU-2022:1484-1
Security update for git

SUSE-SU-2022:1306-1
Security update for git

SUSE-SU-2022:1260-1
Security update for git

BDU:2022-02723
Уязвимость распределенной системы управления версиями Git, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии или выполнить произвольные команды

SUSE-SU-2022:3494-1
Security update for libgit2

SUSE-SU-2022:3283-1
Security update for libgit2

SUSE-SU-2022:3495-1
Security update for libgit2

ROS-20220516-05
Множественные уязвимости Git
ELSA-2023-2859
ELSA-2023-2859: git security and bug fix update (MODERATE)
ELSA-2023-2319
ELSA-2023-2319: git security and bug fix update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-24765 Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ... | CVSS3: 6 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-24765 Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access ... | CVSS3: 7.8 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-24765 Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access fro | CVSS3: 6 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-24765 GitHub: Uncontrolled search for the Git directory in Git for Windows | 0% Низкий | около 3 лет назад | |
CVE-2022-24765 Git for Windows is a fork of Git containing Windows-specific patches. ... | CVSS3: 6 | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1484-1 Security update for git | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1306-1 Security update for git | 0% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:1260-1 Security update for git | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-02723 Уязвимость распределенной системы управления версиями Git, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии или выполнить произвольные команды | CVSS3: 6 | 0% Низкий | около 3 лет назад |
![]() | SUSE-SU-2022:3494-1 Security update for libgit2 | больше 2 лет назад | ||
![]() | SUSE-SU-2022:3283-1 Security update for libgit2 | почти 3 года назад | ||
![]() | SUSE-SU-2022:3495-1 Security update for libgit2 | больше 2 лет назад | ||
![]() | ROS-20220516-05 Множественные уязвимости Git | около 3 лет назад | ||
ELSA-2023-2859 ELSA-2023-2859: git security and bug fix update (MODERATE) | около 2 лет назад | |||
ELSA-2023-2319 ELSA-2023-2319: git security and bug fix update (MODERATE) | около 2 лет назад |
Уязвимостей на страницу