jitsucom-jitsu vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the jitsucom-jitsu package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-3x4c-7xq6-9pq8

<2.11.0-r17
  • H
Resource Exhaustion

<2.11.0-r17
  • L
CVE-2026-2229

<2.11.0-r17
  • L
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<2.11.0-r17
  • L
GHSA-2mjp-6q6p-2qxm

<2.11.0-r17
  • L
GHSA-v9p9-hfj2-hcw8

<2.11.0-r17
  • L
CVE-2026-1526

<2.11.0-r17
  • L
GHSA-vrm6-8vpv-qv8q

<2.11.0-r17
  • L
GHSA-8gc5-j5rx-235r

<2.11.0-r17
  • L
GHSA-phc3-fgpg-7m6h

<2.11.0-r17
  • M
HTTP Request Smuggling

<2.11.0-r17
  • L
GHSA-f269-vfmq-vjvj

<2.11.0-r17
  • L
GHSA-4992-7rv2-5pvq

<2.11.0-r17
  • L
CVE-2026-2581

<2.11.0-r17
  • L
CVE-2026-1528

<2.11.0-r17
  • L
CVE-2026-1527

<2.11.0-r17
  • C
CVE-2026-1525

<2.11.0-r17
  • L
GHSA-ggv3-7p47-pfv8

<2.11.0-r17
  • L
GHSA-pxg6-pf52-xh8x

<2.8.2-r2
  • L
GHSA-554w-wpv2-vw27

<2.11.0-r8
  • L
GHSA-5gfm-wpxj-wjgq

<2.11.0-r8
  • L
GHSA-33vc-wfww-vjfv

<2.11.0-r3
  • L
Allocation of Resources Without Limits or Throttling

<2.11.0-r2
  • L
GHSA-mwv6-3258-q52c

<2.11.0-r11
  • H
Allocation of Resources Without Limits or Throttling

<2.11.0-r12
  • L
GHSA-76p3-8jx3-jpfq

<2.11.0-r6
  • L
CVE-2024-47764

<2.8.2-r2
  • L
GHSA-5jpx-9hw9-2fx4

<2.11.0-r6
  • L
GHSA-f82v-jwr5-mffw

<2.9.0-r0
  • L
CVE-2025-66478

<2.11.0-r9
  • L
GHSA-4hjh-wcwx-xvwj

<2.11.0-r2
  • L
CVE-2024-55565

<2.8.5-r0
  • H
CVE-2025-59472

<2.11.0-r14
  • L
GHSA-fj3w-jwp8-x2g3

<2.11.0-r16
  • L
GHSA-4342-x723-ch2f

<2.11.0-r1
  • L
CVE-2025-22871

<2.11.0-r6
  • L
Information Exposure Through Caching

<2.11.0-r1
  • L
GHSA-g9mf-h72j-4rw9

<2.11.0-r12
  • L
GHSA-mm7p-fcc7-pg87

<2.11.0-r4
  • L
GHSA-mwcw-c2x4-8c55

<2.8.5-r0
  • L
Incorrect Authorization

<2.9.0-r0
  • L
GHSA-9qr9-h5gf-34mp

<2.11.0-r9
  • L
GHSA-5f7q-jpqc-wp7h

<2.11.0-r14
  • L
GHSA-rcmh-qjqh-p98v

<2.11.0-r8
  • H
Server-Side Request Forgery (SSRF)

<2.11.0-r1
  • L
GHSA-8cj5-5rvv-wf4v

<2.10.0-r0
  • L
CVE-2025-7783

<2.10.0-r4
  • L
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

<2.11.0-r15
  • L
Inefficient Regular Expression Complexity

<2.8.6-r3
  • L
Authorization Bypass Through User-Controlled Key

<2.8.2-r1
  • H
Improper Validation of Syntactic Correctness of Input

<2.11.0-r4
  • L
GHSA-37qj-frw5-hhjh

<2.11.0-r14
  • L
GHSA-pfq8-rq6v-vf5m

<2.8.4-r0
  • L
Improper Check for Unusual or Exceptional Conditions

<2.11.0-r15
  • L
GHSA-968p-4wvh-cqc8

<2.8.6-r3
  • L
CVE-2025-9910

<2.11.0-r3
  • L
GHSA-xxjr-mmjv-4gpg

<2.11.0-r12
  • L
GHSA-r2fc-ccr8-96c4

<2.10.0-r2
  • M
CVE-2025-13465

<2.11.0-r12
  • L
Improper Input Validation

<2.11.0-r14
  • H
Buffer Overflow

<2.11.0-r16
  • L
GHSA-fjxv-7rqg-78g4

<2.10.0-r4
  • H
Uncontrolled Recursion

<2.11.0-r8
  • L
GHSA-gp8f-8m3g-qvj9

<2.8.2-r1
  • H
Inefficient Regular Expression Complexity

<2.8.4-r0
  • L
Use of Insufficiently Random Values

<2.8.6-r1
  • H
Uncontrolled Recursion

<2.8.2-r1
  • L
GHSA-mh29-5h37-fv8m

<2.11.0-r7
  • L
Improper Input Validation

<2.11.0-r1
  • L
GHSA-c76h-2ccp-4975

<2.8.6-r1
  • L
GHSA-jmr7-xgp7-cmfj

<2.11.0-r15
  • L
GHSA-g77x-44xx-532m

<2.8.2-r1
  • L
GHSA-xv57-4mr9-wg8v

<2.11.0-r1
  • M
Integer Overflow or Wraparound

<2.11.0-r8
  • L
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<2.11.0-r7
  • L
GHSA-43fc-jf86-j433

<2.11.0-r15
  • L
GHSA-jr5f-v2jv-69x6

<2.8.6-r2
  • L
Allocation of Resources Without Limits or Throttling

<2.8.5-r3
  • L
GHSA-g9pc-8g42-g6vq

<2.11.0-r6
  • L
GHSA-7m27-7ghc-44w9

<2.8.5-r3
  • L
GHSA-w37m-7fhw-fmv9

<2.11.0-r11
  • L
Improper Verification of Cryptographic Signature

<2.11.0-r10
  • M
Server-Side Request Forgery (SSRF)

<2.8.6-r2
  • C
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

<2.11.0-r6
  • L
GHSA-g5qg-72qw-gw5v

<2.11.0-r1
  • L
CVE-2025-12816

<2.11.0-r8
  • L
GHSA-869p-cjfg-cm3x

<2.11.0-r10
  • L
HTTP Request Smuggling

<2.10.0-r2
  • H
Improper Check or Handling of Exceptional Conditions

<2.11.0-r8
  • L
Directory Traversal

<2.10.0-r0
  • L
GHSA-65ch-62r8-g69g

<2.11.0-r8
  • H
Server-Side Request Forgery (SSRF)

<2.8.0-r1
  • L
GHSA-8hc4-vh64-cxmj

<2.8.0-r1
  • H
CVE-2024-34351

<2.8.0-r0
  • L
GHSA-fr5h-rqp8-mj6g

<2.8.0-r0
  • L
CVE-2024-37168

<2.7.0-r1
  • L
GHSA-7v5v-9h63-cj86

<2.7.0-r1