tflint

Direct Vulnerabilities

Known vulnerabilities in the tflint package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Certificate Validation

<0.61.0-r10
  • L
GHSA-xm5m-wgh2-rrg3

<0.61.0-r10
  • L
CVE-2026-4660

<0.61.0-r9
  • L
GHSA-92mm-2pjq-r785

<0.61.0-r9
  • L
GHSA-xmrv-pmrh-hhx2

<0.61.0-r8
  • H
Untrusted Search Path

<0.61.0-r7
  • L
GHSA-hfvc-g4fc-pqhx

<0.61.0-r7
  • L
GHSA-78h2-9frx-2jm8

<0.61.0-r5
  • L
Uncaught Exception

<0.61.0-r5
  • L
GHSA-p77j-4mvh-x3m3

<0.61.0-r4
  • L
Improper Authorization

<0.61.0-r4
  • L
GHSA-j4j7-vw47-rhfq

<0.61.0-r3
  • L
GHSA-j3gx-2473-5fp8

<0.61.0-r3
  • L
GHSA-rv83-g57w-fr8j

<0.61.0-r3
  • L
Directory Traversal

<0.61.0-r3
  • L
Direct Request ('Forced Browsing')

<0.61.0-r3
  • L
Cross-site Scripting (XSS)

<0.61.0-r3
  • L
GHSA-9h8m-3fm2-qjrq

<0.61.0-r1
  • L
Untrusted Search Path

<0.61.0-r1
  • L
GHSA-4c4x-jm2x-pf9j

<0.60.0-r7
  • L
Server-Side Request Forgery (SSRF)

<0.60.0-r7
  • L
NULL Pointer Dereference

<0.60.0-r7
  • L
GHSA-273p-m2cw-6833

<0.60.0-r7
  • L
GHSA-jqc5-w2xx-5vq4

<0.60.0-r6
  • L
Directory Traversal

<0.60.0-r6
  • L
GHSA-fcv2-xgw5-pqxf

<0.60.0-r6
  • M
Directory Traversal

<0.60.0-r6
  • H
Improper Verification of Cryptographic Signature

<0.60.0-r4
  • H
Reachable Assertion

<0.60.0-r4
  • L
GHSA-846p-jg2w-w324

<0.60.0-r4
  • L
GHSA-fphv-w9fq-2525

<0.60.0-r4
  • L
GHSA-hcg3-q754-cr77

<0.55.1-r3
  • L
GHSA-6v2p-p543-phr9

<0.55.1-r4
  • L
Asymmetric Resource Consumption (Amplification)

<0.60.0-r3
  • L
GHSA-4qg8-fj49-pxjh

<0.60.0-r3
  • L
CVE-2025-58181

<0.60.0-r1
  • L
CVE-2025-47914

<0.60.0-r1
  • L
GHSA-f6x5-jh6r-wrfv

<0.60.0-r1
  • L
GHSA-j5w8-q4qc-rx2x

<0.60.0-r1
  • L
CVE-2025-47910

<0.59.1-r1
  • L
Allocation of Resources Without Limits or Throttling

<0.58.1-r5
  • L
CVE-2025-8959

<0.58.1-r3
  • L
Race Condition

<0.58.1-r2
  • L
CVE-2025-22874

<0.58.0-r1
  • L
CVE-2025-4673

<0.58.0-r1
  • L
CVE-2025-22872

<0.56.0-r2
  • L
CVE-2025-22871

<0.56.0-r1
  • L
CVE-2025-22870

<0.55.1-r5
  • L
CVE-2025-22868

<0.55.1-r4
  • L
CVE-2025-22869

<0.55.1-r3
  • L
Allocation of Resources Without Limits or Throttling

<0.55.1-r2
  • L
CVE-2025-22866

<0.55.1-r1
  • L
CVE-2024-45341

<0.55.0-r1
  • L
CVE-2024-45336

<0.55.0-r1
  • L
CVE-2024-45338

<0.54.0-r2
  • L
CVE-2024-45337

<0.54.0-r1
  • L
CVE-2024-34155

<0.53.0-r1
  • L
CVE-2024-34156

<0.53.0-r1
  • L
CVE-2024-34158

<0.53.0-r1
  • L
CVE-2024-24791

<0.51.2-r1
  • H
CVE-2024-6257

<0.51.1-r2
  • C
CVE-2024-24790

<0.51.1-r1
  • M
CVE-2024-24789

<0.51.1-r1
  • L
CVE-2024-3817

<0.51.0-r0
  • L
CVE-2023-45288

<0.51.0-r0
  • L
CVE-2024-24786

<0.50.3-r2
  • L
CVE-2024-24783

<0.50.3-r1
  • L
CVE-2023-45289

<0.50.3-r1
  • L
CVE-2024-24785

<0.50.3-r1
  • L
CVE-2023-45290

<0.50.3-r1
  • L
CVE-2024-24784

<0.50.3-r1