gitweb vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gitweb package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
Link Following

<0:2.47.3-1.amzn2.0.1
  • H
Arbitrary Argument Injection

<0:2.47.3-1.amzn2.0.1
  • H
External Control of File Name or Path

<0:2.47.3-1.amzn2.0.1
  • H
OS Command Injection

<0:2.47.3-1.amzn2.0.1
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.3
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • M
Improper Neutralization

<0:2.47.1-1.amzn2.0.2
  • H
Symlink Following

<0:2.40.1-1.amzn2.0.3
  • H
Directory Traversal

<0:2.40.1-1.amzn2.0.3
  • H
UNIX Hard Link

<0:2.40.1-1.amzn2.0.3
  • H
Unrestricted Upload of File with Dangerous Type

<0:2.40.1-1.amzn2.0.3
  • H
Improper Process Control

<0:2.40.1-1.amzn2.0.3
  • H
ALAS2-2024-2535

<0:2.40.1-1.amzn2.0.2
  • M
CVE-2023-25652

<0:2.40.1-1.amzn2.0.1
  • M
Arbitrary Code Injection

<0:2.40.1-1.amzn2.0.1
  • M
Directory Traversal

<0:2.39.2-1.amzn2.0.1
  • M
Resource Leak

<0:2.39.2-1.amzn2.0.1
  • H
Improperly Implemented Security Check for Standard

<0:2.23.1-0.amzn2.0.2
  • H
Reliance on Untrusted Inputs in a Security Decision

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
External Control of File Name or Path

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Improper Input Validation

<0:2.23.1-0.amzn2.0.2
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Integer Overflow or Wraparound

<0:2.39.1-1.amzn2.0.1
  • H
Out-of-bounds Write

<0:2.38.1-1.amzn2.0.1
  • H
Link Following

<0:2.38.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.37.1-1.amzn2.0.1
  • M
Uncontrolled Search Path Element

<0:2.34.3-1.amzn2.0.2
  • M
Link Following

<0:2.23.4-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.3-1.amzn2.0.1
  • H
Insufficiently Protected Credentials

<0:2.23.1-1.amzn2.0.2
  • H
OS Command Injection

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1387

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1353

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Use of Incorrectly-Resolved Name or Reference

<0:2.23.1-1.amzn2.0.1
  • H
CVE-2019-1348

<0:2.23.1-1.amzn2.0.1
  • H
Improper Input Validation

<0:2.23.1-1.amzn2.0.1
  • H
Untrusted Search Path

<0:2.17.2-2.amzn2
  • H
Arbitrary Argument Injection

<0:2.14.5-1.amzn2
  • H
Out-of-bounds Read

<0:2.14.4-1.amzn2
  • H
Directory Traversal

<0:2.14.4-1.amzn2