git vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the git package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
Link Following

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
Arbitrary Argument Injection

<0:2.47.3-1.amzn2.0.1
  • H
OS Command Injection

<0:2.47.3-1.amzn2.0.1
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.3
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • H
UNIX Hard Link

<0:2.40.1-1.amzn2.0.3
  • H
Directory Traversal

<0:2.40.1-1.amzn2.0.3
  • H
Symlink Following

<0:2.40.1-1.amzn2.0.3
  • H
Improper Process Control

<0:2.40.1-1.amzn2.0.3
  • H
Unrestricted Upload of File with Dangerous Type

<0:2.40.1-1.amzn2.0.3
  • H
ALAS2-2024-2535

<0:2.40.1-1.amzn2.0.2
  • M
CVE-2023-25652

<0:2.40.1-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:2.40.1-1.amzn2.0.1
  • M
Directory Traversal

<0:2.39.2-1.amzn2.0.1
  • M
Resource Leak

<0:2.39.2-1.amzn2.0.1
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.1-1.amzn2.0.1
  • H
Link Following

<0:2.38.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.37.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.34.3-1.amzn2.0.2
  • M
Link Following

<0:2.23.4-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.3-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.1-1.amzn2.0.2
  • H
OS Command Injection

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1387

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1353

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1348

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Untrusted Search Path

<0:2.17.2-2.amzn2
  • H
Arbitrary Argument Injection

<0:2.14.5-1.amzn2
  • H
Out-of-bounds Read

<0:2.14.4-1.amzn2
  • H
Directory Traversal

<0:2.14.4-1.amzn2