git-core-doc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the git-core-doc package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
OS Command Injection

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
Arbitrary Argument Injection

<0:2.47.3-1.amzn2.0.1
  • H
Link Following

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.3
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • H
Improper Process Control

<0:2.40.1-1.amzn2.0.3
  • H
Symlink Following

<0:2.40.1-1.amzn2.0.3
  • H
Unrestricted Upload of File with Dangerous Type

<0:2.40.1-1.amzn2.0.3
  • H
Directory Traversal

<0:2.40.1-1.amzn2.0.3
  • H
UNIX Hard Link

<0:2.40.1-1.amzn2.0.3
  • H
ALAS2-2024-2535

<0:2.40.1-1.amzn2.0.2
  • M
CVE-2023-25652

<0:2.40.1-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:2.40.1-1.amzn2.0.1
  • M
Directory Traversal

<0:2.39.2-1.amzn2.0.1
  • M
Resource Leak

<0:2.39.2-1.amzn2.0.1
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.1-1.amzn2.0.1
  • H
Link Following

<0:2.38.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.37.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.34.3-1.amzn2.0.2
  • M
Link Following

<0:2.23.4-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.3-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.1-1.amzn2.0.2
  • H
OS Command Injection

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1387

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1353

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1348

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Untrusted Search Path

<0:2.17.2-2.amzn2
  • H
Arbitrary Argument Injection

<0:2.14.5-1.amzn2
  • H
Out-of-bounds Read

<0:2.14.4-1.amzn2
  • H
Directory Traversal

<0:2.14.4-1.amzn2