Git For Windows Project

Git For Windows

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 25.04.2023 21:15:10
  • Last modified 21.11.2024 07:56:23

Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location...

  • EPSS 0.08%
  • Published 25.04.2023 21:15:10
  • Last modified 21.11.2024 07:56:23

Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be execu...

  • EPSS 0.09%
  • Published 25.04.2023 20:15:09
  • Last modified 21.11.2024 07:50:15

In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, th...

  • EPSS 0.06%
  • Published 14.02.2023 21:15:13
  • Last modified 21.11.2024 07:46:32

Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some...

  • EPSS 0.02%
  • Published 14.02.2023 21:15:12
  • Last modified 21.11.2024 07:45:20

Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, by carefully crafting DLL and putting into a subdirectory of a specific name living next to the Git for Windows installer, Windows can be...

  • EPSS 1.25%
  • Published 12.04.2022 18:15:09
  • Last modified 21.11.2024 06:51:03

GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.

Exploit
  • EPSS 0.06%
  • Published 11.11.2016 17:59:00
  • Last modified 12.04.2025 10:46:40

Untrusted search path vulnerability in Git 1.x for Windows allows local users to gain privileges via a Trojan horse git.exe file in the current working directory. NOTE: 2.x is unaffected.