
CVE-2024-22830
https://notcve.org/view.php?id=CVE-2024-22830
01 May 2024 — Anti-Cheat Expert's Windows kernel module "ACE-BASE.sys" version 1.0.2202.6217 does not perform proper access control when handling system resources. This allows a local attacker to escalate privileges from regular user to System or PPL level. El módulo del kernel de Windows de Anti-Cheat Expert "ACE-BASE.sys" versión 1.0.2202.6217 no realiza un control de acceso adecuado cuando maneja los recursos del sistema. Esto permite a un atacante local escalar privilegios desde el nivel de usuario normal al nivel de... • http://anti-cheat.com • CWE-284: Improper Access Control •

CVE-2023-29012 – Git CMD erroneously executes `doskey.exe` in the current directory, if it exists
https://notcve.org/view.php?id=CVE-2023-29012
25 Apr 2023 — Git for Windows is the Windows port of Git. Prior to version 2.40.1, any user of Git CMD who starts the command in an untrusted directory is impacted by an Uncontrolles Search Path Element vulnerability. Maliciously-placed `doskey.exe` would be executed silently upon running Git CMD. The problem has been patched in Git for Windows v2.40.1. As a workaround, avoid using Git CMD or, if using Git CMD, avoid starting it in an untrusted directory. • https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1 • CWE-427: Uncontrolled Search Path Element •

CVE-2023-29011 – Git for Windows's config file of `connect.exe` is susceptible to malicious placing
https://notcve.org/view.php?id=CVE-2023-29011
25 Apr 2023 — Git for Windows, the Windows port of Git, ships with an executable called `connect.exe`, which implements a SOCKS5 proxy that can be used to connect e.g. to SSH servers via proxies when certain ports are blocked for outgoing connections. The location of `connect.exe`'s config file is hard-coded as `/etc/connectrc` which will typically be interpreted as `C:\etc\connectrc`. Since `C:\etc` can be created by any authenticated user, this makes `connect.exe` susceptible to malicious files being placed there by ot... • https://github.com/git-for-windows/git/releases/tag/v2.40.1.windows.1 • CWE-427: Uncontrolled Search Path Element •

CVE-2023-25815 – Git looks for localized messages in the wrong place
https://notcve.org/view.php?id=CVE-2023-25815
25 Apr 2023 — In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C... • http://www.openwall.com/lists/oss-security/2023/04/25/2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-134: Use of Externally-Controlled Format String •

CVE-2023-22743 – Git for Windows' installer is susceptible to DLL side loading attacks
https://notcve.org/view.php?id=CVE-2023-22743
14 Feb 2023 — Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, by carefully crafting DLL and putting into a subdirectory of a specific name living next to the Git for Windows installer, Windows can be tricked into side-loading said DLL. This potentially allows users with local write access to place malicious payloads in a location where automated upgrades might run the Git for Windows installer with elevation. Version 2.39.2 contains a patch for this issue. ... • https://attack.mitre.org/techniques/T1574/002 • CWE-426: Untrusted Search Path •

CVE-2023-23618 – gitk can inadvertently call executables in the worktree
https://notcve.org/view.php?id=CVE-2023-23618
14 Feb 2023 — Git for Windows is the Windows port of the revision control system Git. Prior to Git for Windows version 2.39.2, when `gitk` is run on Windows, it potentially runs executables from the current directory inadvertently, which can be exploited with some social engineering to trick users into running untrusted code. A patch is available in version 2.39.2. As a workaround, avoid using `gitk` (or Git GUI's "Visualize History" functionality) in clones of untrusted repositories. • https://github.com/git-for-windows/git/commit/49a8ec9dac3cec6602f05fed1b3f80a549c8c05c • CWE-426: Untrusted Search Path •

CVE-2022-46330
https://notcve.org/view.php?id=CVE-2022-46330
21 Dec 2022 — Squirrel.Windows is both a toolset and a library that provides installation and update functionality for Windows desktop applications. Installers generated by Squirrel.Windows 2.0.1 and earlier contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with the privilege of the user invoking the installer. Squirrel.Windows es un conjunto de herramientas y una librería que proporciona funcionalidad de instalación y actua... • https://github.com/Squirrel/Squirrel.Windows • CWE-427: Uncontrolled Search Path Element •

CVE-2022-24767
https://notcve.org/view.php?id=CVE-2022-24767
12 Apr 2022 — GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account. GitHub: El desinstalador de Git para Windows es vulnerable al secuestro de DLL cuando se ejecuta bajo la cuenta de usuario SYSTEM • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24767 • CWE-427: Uncontrolled Search Path Element •

CVE-2021-45459
https://notcve.org/view.php?id=CVE-2021-45459
22 Dec 2021 — lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter. el archivo lib/cmd.js en el paquete node-windows versiones anteriores a 1.0.0-beta.6 para Node.js, permite la inyección de comandos por medio del parámetro PID • https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2016-10696
https://notcve.org/view.php?id=CVE-2016-10696
04 Jun 2018 — windows-latestchromedriver downloads the latest version of chromedriver.exe. windows-latestchromedriver downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. windows-latestchromedriver descarga la última versión de chromedriver.exe. windows-latestchromedriver desc... • https://nodesecurity.io/advisories/295 • CWE-310: Cryptographic Issues CWE-311: Missing Encryption of Sensitive Data •