git vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the git package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Process Control

<0:2.18.4-5.el8_2
  • H
Improper Process Control

<0:2.31.8-3.el8_6
  • H
Directory Traversal

<0:2.31.8-3.el8_6
  • H
Improper Process Control

<0:2.31.8-3.el8_6
  • H
Directory Traversal

<0:2.31.8-3.el8_6
  • H
Improper Process Control

<0:2.31.8-3.el8_6
  • H
Directory Traversal

<0:2.31.8-3.el8_6
  • H
Improper Process Control

<0:2.27.0-5.el8_4
  • H
Directory Traversal

<0:2.27.0-5.el8_4
  • H
Improper Process Control

<0:2.27.0-5.el8_4
  • H
Directory Traversal

<0:2.27.0-5.el8_4
  • H
Improper Process Control

<0:2.27.0-5.el8_4
  • H
Directory Traversal

<0:2.27.0-5.el8_4
  • H
Improper Process Control

<0:2.39.5-1.el8_8
  • H
Directory Traversal

<0:2.39.5-1.el8_8
  • H
Improper Process Control

<0:2.39.5-1.el8_8
  • H
Directory Traversal

<0:2.39.5-1.el8_8
  • H
Improper Process Control

<0:2.39.5-1.el8_8
  • H
Directory Traversal

<0:2.39.5-1.el8_8
  • H
Improper Process Control

<0:2.39.5-1.el8_8
  • H
Directory Traversal

<0:2.39.5-1.el8_8
  • H
UNIX Hard Link

<0:2.43.5-1.el8_10
  • H
Symlink Following

<0:2.43.5-1.el8_10
  • H
Improper Process Control

<0:2.43.5-1.el8_10
  • H
Directory Traversal

<0:2.43.5-1.el8_10
  • H
Directory Traversal

<0:2.43.5-1.el8_10
  • M
Directory Traversal

<0:2.31.8-1.el8_6
  • M
Resource Leak

<0:2.31.8-1.el8_6
  • M
Out-of-bounds Write

<0:2.31.8-1.el8_6
  • M
Link Following

<0:2.31.8-1.el8_6
  • M
Improper Ownership Management

<0:2.31.8-1.el8_6
  • M
Uncontrolled Search Path Element

<0:2.31.8-1.el8_6
  • M
Directory Traversal

<0:2.31.8-1.el8_6
  • M
Resource Leak

<0:2.31.8-1.el8_6
  • M
Out-of-bounds Write

<0:2.31.8-1.el8_6
  • M
Link Following

<0:2.31.8-1.el8_6
  • M
Improper Ownership Management

<0:2.31.8-1.el8_6
  • M
Uncontrolled Search Path Element

<0:2.31.8-1.el8_6
  • M
Directory Traversal

<0:2.31.8-1.el8_6
  • M
Resource Leak

<0:2.31.8-1.el8_6
  • M
Out-of-bounds Write

<0:2.31.8-1.el8_6
  • M
Link Following

<0:2.31.8-1.el8_6
  • M
Improper Ownership Management

<0:2.31.8-1.el8_6
  • M
Uncontrolled Search Path Element

<0:2.31.8-1.el8_6
  • M
Directory Traversal

<0:2.31.8-1.el8_6
  • M
Resource Leak

<0:2.31.8-1.el8_6
  • M
Out-of-bounds Write

<0:2.31.8-1.el8_6
  • M
Link Following

<0:2.31.8-1.el8_6
  • M
Improper Ownership Management

<0:2.31.8-1.el8_6
  • M
Uncontrolled Search Path Element

<0:2.31.8-1.el8_6
  • H
Directory Traversal

<0:2.18.4-3.el8_1
  • H
Directory Traversal

<0:2.31.1-4.el8_6
  • H
Directory Traversal

<0:2.31.1-4.el8_6
  • H
Directory Traversal

<0:2.27.0-4.el8_4
  • H
Directory Traversal

<0:2.27.0-4.el8_4
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.27.0-4.el8_4
  • H
Directory Traversal

<0:2.18.4-4.el8_2
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.27.0-4.el8_4
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.31.1-4.el8_6
  • H
Directory Traversal

<0:2.31.1-4.el8_6
  • H
Arbitrary Code Injection

<0:2.39.3-1.el8_8
  • H
Arbitrary Code Injection

<0:2.27.0-4.el8_4
  • H
Arbitrary Code Injection

<0:2.18.4-4.el8_2
  • H
Arbitrary Code Injection

<0:2.27.0-4.el8_4
  • H
Arbitrary Code Injection

<0:2.18.4-3.el8_1
  • H
Arbitrary Code Injection

<0:2.31.1-4.el8_6
  • H
Arbitrary Code Injection

<0:2.31.1-4.el8_6
  • H
Arbitrary Code Injection

<0:2.31.1-4.el8_6
  • H
Arbitrary Code Injection

<0:2.39.3-1.el8_8
  • H
Arbitrary Code Injection

<0:2.27.0-4.el8_4
  • H
Arbitrary Code Injection

<0:2.31.1-4.el8_6
  • H
Arbitrary Code Injection

<0:2.39.3-1.el8_8
  • H
Arbitrary Code Injection

<0:2.39.3-1.el8_8
  • H
Arbitrary Code Injection

<0:2.27.0-4.el8_4
  • H
Arbitrary Code Injection

<0:2.39.3-1.el8_8
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el8_8
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el8_8
  • H
Use of Externally-Controlled Format String

<0:2.18.4-3.el8_1
  • H
Use of Externally-Controlled Format String

<0:2.31.1-4.el8_6
  • H
Use of Externally-Controlled Format String

<0:2.31.1-4.el8_6
  • H
Use of Externally-Controlled Format String

<0:2.18.4-4.el8_2
  • H
Use of Externally-Controlled Format String

<0:2.27.0-4.el8_4
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el8_8
  • H
Use of Externally-Controlled Format String

<0:2.31.1-4.el8_6
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el8_8
  • H
Use of Externally-Controlled Format String

<0:2.27.0-4.el8_4
  • H
Use of Externally-Controlled Format String

<0:2.27.0-4.el8_4
  • H
Use of Externally-Controlled Format String

<0:2.27.0-4.el8_4
  • H
Use of Externally-Controlled Format String

<0:2.31.1-4.el8_6
  • H
Use of Externally-Controlled Format String

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Directory Traversal

<0:2.39.3-1.el8_8
  • H
Resource Leak

<0:2.39.3-1.el8_8
  • H
Resource Leak

<0:2.39.3-1.el8_8
  • H
Resource Leak

<0:2.39.3-1.el8_8
  • H
Resource Leak

<0:2.39.3-1.el8_8
  • H
Resource Leak

<0:2.39.3-1.el8_8
  • H
Integer Overflow or Wraparound

<0:2.18.4-2.el8_1
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.18.4-3.el8_2
  • H
Integer Overflow or Wraparound

<0:2.18.4-3.el8_2
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.18.4-3.el8_2
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.18.4-2.el8_1
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.18.4-3.el8_2
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.27.0-3.el8_4
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_6
  • H
Integer Overflow or Wraparound

<0:2.18.4-3.el8_2
  • H
Integer Overflow or Wraparound

<0:2.31.1-3.el8_7
  • H
Integer Overflow or Wraparound

<0:2.18.4-3.el8_2
  • M
Link Following

<0:2.39.1-1.el8
  • M
Link Following

<0:2.39.1-1.el8
  • M
Link Following

<0:2.39.1-1.el8
  • M
Link Following

<0:2.39.1-1.el8
  • M
Link Following

<0:2.39.1-1.el8
  • M
Out-of-bounds Write

<0:2.39.1-1.el8
  • M
Out-of-bounds Write

<0:2.39.1-1.el8
  • M
Out-of-bounds Write

<0:2.39.1-1.el8
  • M
Out-of-bounds Write

<0:2.39.1-1.el8
  • M
Out-of-bounds Write

<0:2.39.1-1.el8
  • M
Improper Ownership Management

<0:2.39.1-1.el8
  • M
Improper Ownership Management

<0:2.39.1-1.el8
  • M
Improper Ownership Management

<0:2.39.1-1.el8
  • M
Improper Ownership Management

<0:2.39.1-1.el8
  • M
Improper Ownership Management

<0:2.39.1-1.el8
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el8
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el8
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el8
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el8
  • M
Uncontrolled Search Path Element

<0:2.39.1-1.el8
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-1.el8_1
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-1.el8_0
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-1.el8_1
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.4-2.el8_2
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_0
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
Improper Input Validation

<0:2.18.2-2.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_0
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
External Control of File Name or Path

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_0
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_0
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_0
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • H
Improper Input Validation

<0:2.18.2-1.el8_1
  • M
OS Command Injection

*