git-instaweb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the git-instaweb package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
OS Command Injection

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
Link Following

<0:2.47.3-1.amzn2.0.1
  • H
Arbitrary Argument Injection

<0:2.47.3-1.amzn2.0.1
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.3
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • H
Symlink Following

<0:2.40.1-1.amzn2.0.3
  • H
Improper Process Control

<0:2.40.1-1.amzn2.0.3
  • H
Directory Traversal

<0:2.40.1-1.amzn2.0.3
  • H
UNIX Hard Link

<0:2.40.1-1.amzn2.0.3
  • H
Unrestricted Upload of File with Dangerous Type

<0:2.40.1-1.amzn2.0.3
  • H
ALAS2-2024-2535

<0:2.40.1-1.amzn2.0.2
  • M
CVE-2023-25652

<0:2.40.1-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:2.40.1-1.amzn2.0.1
  • M
Directory Traversal

<0:2.39.2-1.amzn2.0.1
  • M
Resource Leak

<0:2.39.2-1.amzn2.0.1
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.1-1.amzn2.0.1
  • H
Link Following

<0:2.38.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.37.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.34.3-1.amzn2.0.2
  • M
Link Following

<0:2.23.4-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.3-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.1-1.amzn2.0.2
  • H
OS Command Injection

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1387

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1353

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1348

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1