gitsign vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gitsign package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-p77j-4mvh-x3m3

<0.14.0-r11
  • L
Improper Authorization

<0.14.0-r11
  • H
CVE-2025-15558

<0.14.0-r9
  • L
GHSA-p436-gjf2-799p

<0.14.0-r9
  • C
CVE-2025-68121

<0.14.0-r2
  • H
Reachable Assertion

<0.14.0-r0
  • L
Asymmetric Resource Consumption (Amplification)

<0.12.0-r9
  • L
GHSA-273p-m2cw-6833

<0.14.0-r0
  • L
CVE-2025-22869

<0.12.0-r6
  • L
CVE-2025-22872

<0.13.0-r1
  • L
CVE-2025-61732

<0.14.0-r2
  • L
Resource Exhaustion

<0.12.0-r1
  • H
Improper Verification of Cryptographic Signature

<0.14.0-r0
  • L
CVE-2024-34158

<0.10.2-r7
  • L
CVE-2024-34155

<0.10.2-r7
  • L
Arbitrary Argument Injection

<0.12.0-r1
  • L
Asymmetric Resource Consumption (Amplification)

<0.14.0-r0
  • L
Allocation of Resources Without Limits or Throttling

<0.12.0-r5
  • L
Asymmetric Resource Consumption (Amplification)

<0.14.0-r0
  • L
GHSA-j5w8-q4qc-rx2x

<0.13.0-r6
  • L
CVE-2025-58181

<0.13.0-r6
  • L
GHSA-c6gw-w398-hv78

<0.12.0-r5
  • L
GHSA-7wrw-r4p8-38rx

<0.12.0-r2
  • L
CVE-2024-45341

<0.12.0-r2
  • L
CVE-2025-22866

<0.12.0-r3
  • L
Improper Handling of Exceptional Conditions

<0.11.0-r1
  • C
CVE-2026-1229

<0.14.0-r5
  • L
CVE-2024-34156

<0.10.2-r7
  • L
GHSA-846p-jg2w-w324

<0.14.0-r0
  • M
Improper Validation of Integrity Check Value

<0.14.0-r3
  • L
GHSA-whqx-f9j3-ch6m

<0.14.0-r0
  • L
GHSA-f83f-xpx7-ffpw

<0.14.0-r0
  • L
NULL Pointer Dereference

<0.14.0-r0
  • L
GHSA-4c4x-jm2x-pf9j

<0.14.0-r0
  • L
Improper Certificate Validation

<0.13.0-r7
  • L
GHSA-fcv2-xgw5-pqxf

<0.14.0-r0
  • L
GHSA-3f6r-qh9c-x6mm

<0.12.0-r2
  • L
GHSA-5mh9-3jwc-rp59

<0.13.0-r7
  • L
Directory Traversal

<0.14.0-r0
  • L
CVE-2024-45337

<0.11.0-r2
  • L
CVE-2025-22870

<0.12.0-r8
  • L
GHSA-2x5j-vhc8-9cwm

<0.13.0-r2
  • M
Insufficient Verification of Data Authenticity

<0.14.0-r0
  • L
GHSA-qxp5-gwg8-xv66

<0.12.0-r8
  • L
GHSA-h355-32pf-p2xm

<0.14.0-r2
  • L
Server-Side Request Forgery (SSRF)

<0.14.0-r0
  • L
GHSA-v778-237x-gjrc

<0.11.0-r2
  • L
CVE-2025-47914

<0.13.0-r6
  • L
GHSA-fw7p-63qq-7hpr

<0.14.0-r4
  • L
GHSA-6v2p-p543-phr9

<0.12.0-r7
  • L
GHSA-q9hv-hpm4-hj6x

<0.14.0-r5
  • L
CVE-2025-22868

<0.12.0-r7
  • L
GHSA-8jvr-vh7g-f8gx

<0.14.0-r2
  • L
Race Condition

<0.13.0-r5
  • L
GHSA-29wx-vh33-7x7r

<0.11.0-r1
  • L
GHSA-4f8r-qqr9-fq8j

<0.13.0-r5
  • L
GHSA-j7vj-rw65-4v26

<0.10.2-r7
  • L
Improper Certificate Validation

<0.13.0-r7
  • L
CVE-2024-45338

<0.11.0-r4
  • M
Server-Side Request Forgery (SSRF)

<0.14.0-r0
  • L
GHSA-hcg3-q754-cr77

<0.12.0-r6
  • L
GHSA-f6x5-jh6r-wrfv

<0.13.0-r6
  • L
GHSA-gwrf-jf3h-w649

<0.13.0-r4
  • L
Improper Initialization

<0.14.0-r4
  • L
GHSA-vvgc-356p-c3xw

<0.13.0-r1
  • L
GHSA-mh63-6h87-95cp

<0.12.0-r9
  • L
GHSA-jqc5-w2xx-5vq4

<0.14.0-r0
  • L
GHSA-37cx-329c-33x3

<0.14.0-r3
  • L
CVE-2025-47906

<0.13.0-r4
  • L
CVE-2024-45336

<0.12.0-r2
  • L
GHSA-4qg8-fj49-pxjh

<0.14.0-r0
  • L
GHSA-crqm-pwhx-j97f

<0.10.2-r7
  • L
GHSA-3whm-j4xm-rv8x

<0.12.0-r3
  • L
GHSA-w32m-9786-jp63

<0.11.0-r4
  • M
Directory Traversal

<0.14.0-r0
  • L
GHSA-59jp-pj84-45mr

<0.14.0-r0
  • L
GHSA-fphv-w9fq-2525

<0.14.0-r0
  • L
Improper Validation of Specified Type of Input

<0.13.0-r2
  • L
GHSA-r9px-m959-cxf4

<0.12.0-r1
  • L
GHSA-v725-9546-7q7m

<0.12.0-r1
  • L
GHSA-7c64-f9jr-v9h2

<0.13.0-r7
  • L
GHSA-8xfx-rj4p-23jm

<0.10.2-r7
  • L
GHSA-v23v-6jw2-98fq

<0.10.2-r5
  • L
CVE-2024-41110

<0.10.2-r5
  • L
GHSA-hw49-2p59-3mhj

<0.10.2-r4
  • L
CVE-2024-24791

<0.10.2-r4
  • M
Information Exposure Through Log Files

<0.10.2-r3
  • L
GHSA-v6v8-xj6m-xwqh

<0.10.2-r3
  • C
CVE-2024-24790

<0.10.2-r2
  • M
CVE-2024-24789

<0.10.2-r2
  • L
GHSA-236w-p7wf-5ph8

<0.10.2-r2
  • L
GHSA-49gw-vxvf-fc2g

<0.10.2-r2
  • L
GHSA-4v7x-pqxf-cx7m

<0.10.1-r3
  • L
CVE-2023-45288

<0.10.1-r3
  • H
Allocation of Resources Without Limits or Throttling

<0.10.1-r2
  • M
Allocation of Resources Without Limits or Throttling

<0.10.1-r2
  • L
GHSA-88jx-383q-w4qc

<0.10.1-r2
  • L
GHSA-95pr-fxf5-86gv

<0.10.1-r2
  • H
Origin Validation Error

<0.8.1-r5
  • L
GHSA-xw73-rw38-6vjc

<0.8.1-r5
  • L
GHSA-8r3f-844c-mc37

<0.8.1-r4
  • L
CVE-2024-24786

<0.8.1-r4
  • L
CVE-2024-28180

<0.8.1-r3
  • L
GHSA-c5q2-7r4c-mv6g

<0.8.1-r3
  • L
GHSA-45x7-px36-x8w8

<0.8.1-r0
  • C
Directory Traversal

<0.8.1-r0
  • M
Improper Validation of Integrity Check Value

<0.8.1-r0
  • M
Resource Exhaustion

<0.8.1-r0
  • L
GHSA-pvcr-v8j8-j5q3

<0.8.1-r0
  • L
GHSA-7f9x-gw85-8grf

<0.8.1-r0
  • H
NULL Pointer Dereference

<0.8.1-r0
  • L
GHSA-mw99-9chc-xw7r

<0.8.1-r0
  • L
GHSA-449p-3h89-pw88

<0.8.1-r0
  • L
GHSA-2c7c-3mj9-8fqh

<0.8.1-r0
  • L
GHSA-9763-4f94-gfch

<0.8.1-r0
  • H
CVE-2023-49568

<0.8.1-r0