gitk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gitk package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Link Following

<0:2.47.3-1.amzn2.0.1
  • H
OS Command Injection

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
Arbitrary Argument Injection

<0:2.47.3-1.amzn2.0.1
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.3
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • H
Unrestricted Upload of File with Dangerous Type

<0:2.40.1-1.amzn2.0.3
  • H
Symlink Following

<0:2.40.1-1.amzn2.0.3
  • H
Directory Traversal

<0:2.40.1-1.amzn2.0.3
  • H
UNIX Hard Link

<0:2.40.1-1.amzn2.0.3
  • H
Improper Process Control

<0:2.40.1-1.amzn2.0.3
  • H
ALAS2-2024-2535

<0:2.40.1-1.amzn2.0.2
  • M
CVE-2023-25652

<0:2.40.1-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:2.40.1-1.amzn2.0.1
  • M
Directory Traversal

<0:2.39.2-1.amzn2.0.1
  • M
Resource Leak

<0:2.39.2-1.amzn2.0.1
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.1-1.amzn2.0.1
  • H
Link Following

<0:2.38.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.37.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.34.3-1.amzn2.0.2
  • M
Link Following

<0:2.23.4-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.3-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.1-1.amzn2.0.2
  • H
OS Command Injection

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1387

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1353

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1348

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Untrusted Search Path

<0:2.17.2-2.amzn2
  • H
Arbitrary Argument Injection

<0:2.14.5-1.amzn2
  • H
Out-of-bounds Read

<0:2.14.4-1.amzn2
  • H
Directory Traversal

<0:2.14.4-1.amzn2