gitaly-config-18.7

Direct Vulnerabilities

Known vulnerabilities in the gitaly-config-18.7 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Allocation of Resources Without Limits or Throttling

*
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<18.7.6-r2
  • C
CVE-2026-27143

<18.7.6-r2
  • H
Allocation of Resources Without Limits or Throttling

<18.7.6-r2
  • L
Partial Comparison

<18.7.6-r2
  • M
Cross-site Scripting (XSS)

<18.7.6-r2
  • M
Link Following

<18.7.6-r2
  • H
Improper Certificate Validation

<18.7.6-r2
  • M
Improper Handling of Length Parameter Inconsistency

<18.7.6-r2
  • L
CVE-2026-32280

<18.7.6-r2
  • L
Incorrect Behavior Order: Validate Before Canonicalize

<18.7.6-r2
  • H
Resource Exhaustion

<18.7.6-r2
  • M
Interpretation Conflict

<18.7.6-r2
  • M
Allocation of Resources Without Limits or Throttling

<18.7.6-r2
  • L
Permissive Regular Expression

<18.7.6-r2
  • L
Resource Exhaustion

<18.7.6-r2
  • H
Incorrect Authorization

<18.7.6-r2
  • H
Permissive Regular Expression

<18.7.6-r2
  • H
Resource Exhaustion

<18.7.6-r2
  • H
Improper Certificate Validation

<18.7.6-r2
  • C
Use of Externally-Controlled Format String

<18.7.6-r1
  • L
Untrusted Search Path

<18.7.6-r1
  • L
Direct Request ('Forced Browsing')

<18.7.6-r0
  • L
Improper Certificate Validation

<18.7.6-r0
  • L
Improper Certificate Validation

<18.7.6-r0
  • L
Cross-site Scripting (XSS)

<18.7.6-r0
  • L
Directory Traversal

<18.7.6-r0
  • L
Directory Traversal

<18.7.5-r0
  • L
Cross-site Scripting (XSS)

<18.7.5-r0
  • L
Server-Side Request Forgery (SSRF)

*
  • H
Allocation of Resources Without Limits or Throttling

<18.7.4-r0
  • M
Cross-site Scripting (XSS)

<18.7.4-r0
  • M
Cross-site Scripting (XSS)

<18.7.4-r0
  • H
Allocation of Resources Without Limits or Throttling

<18.7.4-r0
  • C
CVE-2025-68121

<18.7.3-r1
  • L
CVE-2025-61732

<18.7.3-r1
  • L
CVE-2025-61731

<18.7.2-r0
  • L
CVE-2025-61730

<18.7.2-r0
  • L
Allocation of Resources Without Limits or Throttling

<18.7.2-r0
  • L
Allocation of Resources Without Limits or Throttling

<18.7.2-r0
  • L
Out-of-bounds Write

<18.7.2-r0
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<18.7.2-r0
  • H
Allocation of Resources Without Limits or Throttling

<18.7.2-r0
  • L
Unchecked Return Value

<18.7.2-r0
  • L
Incorrect Authorization

<18.7.2-r0
  • L
Allocation of Resources Without Limits or Throttling

<18.7.2-r0
  • H
Inefficient Regular Expression Complexity

*
  • L
CVE-2024-21510

*