Show filters
48 Total Results
Displaying 11-20 of 48
Sort by:
Attacker Value
Unknown
CVE-2022-24767
Disclosure Date: April 12, 2022 (last updated October 07, 2023)
GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.
0
Attacker Value
Unknown
CVE-2021-46101
Disclosure Date: January 31, 2022 (last updated October 07, 2023)
In Git for windows through 2.34.1 when using git pull to update the local warehouse, git.cmd can be run directly.
0
Attacker Value
Unknown
CVE-2021-45459
Disclosure Date: December 22, 2021 (last updated February 23, 2025)
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
0
Attacker Value
Unknown
CVE-2020-11005
Disclosure Date: April 14, 2020 (last updated February 21, 2025)
The WindowsHello open source library (NuGet HaemmerElectronics.SeppPenner.WindowsHello), before version 1.0.4, has a vulnerability where encrypted data could potentially be decrypted without needing authentication. If the library is used to encrypt text and write the output to a txt file, another executable could be able to decrypt the text using the static method NCryptDecrypt from this same library without the need to use Windows Hello Authentication again. This has been patched in version 1.0.4.
0
Attacker Value
Unknown
CVE-2016-10696
Disclosure Date: June 04, 2018 (last updated November 26, 2024)
windows-latestchromedriver downloads the latest version of chromedriver.exe. windows-latestchromedriver downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown
CVE-2016-10687
Disclosure Date: June 04, 2018 (last updated November 26, 2024)
windows-selenium-chromedriver is a module that downloads the Selenium Jar file. windows-selenium-chromedriver downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown
CVE-2016-10691
Disclosure Date: June 04, 2018 (last updated November 26, 2024)
windows-seleniumjar is a module that downloads the Selenium Jar file windows-seleniumjar downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown
CVE-2016-10689
Disclosure Date: June 04, 2018 (last updated November 26, 2024)
The windows-iedriver module downloads fixed version of iedriverserver.exe windows-iedriver downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown
CVE-2016-10670
Disclosure Date: June 04, 2018 (last updated November 26, 2024)
windows-seleniumjar-mirror downloads the Selenium Jar file windows-seleniumjar-mirror downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
0
Attacker Value
Unknown
CVE-2018-11235
Disclosure Date: May 30, 2018 (last updated November 26, 2024)
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
0