Direct Vulnerabilities

Known vulnerabilities in the trivy package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Certificate Validation

<0.69.3-r12
  • L
GHSA-xm5m-wgh2-rrg3

<0.69.3-r12
  • L
GHSA-92mm-2pjq-r785

<0.69.3-r12
  • L
GHSA-pc3f-x583-g7j2

<0.69.3-r12
  • L
GHSA-hr2v-4r36-88hr

<0.69.3-r12
  • L
Allocation of Resources Without Limits or Throttling

<0.69.3-r12
  • L
CVE-2026-4660

<0.69.3-r12
  • L
GHSA-3xc5-wrhm-f963

<0.69.3-r12
  • M
Directory Traversal

<0.69.3-r12
  • L
GHSA-hfvc-g4fc-pqhx

<0.69.3-r11
  • L
Allocation of Resources Without Limits or Throttling

<0.69.3-r11
  • L
Uncaught Exception

<0.69.3-r10
  • L
GHSA-78h2-9frx-2jm8

<0.69.3-r10
  • L
GHSA-mh2q-q3fh-2475

<0.69.3-r11
  • H
Untrusted Search Path

<0.69.3-r11
  • L
GHSA-xmrv-pmrh-hhx2

<0.69.3-r9
  • M
Cross-site Scripting (XSS)

<0.69.3-r8
  • H
Incorrect Authorization

<0.69.3-r8
  • L
GHSA-jrg3-gfjw-hm96

<0.69.3-r8
  • L
GHSA-gjvh-7jh8-7xhm

<0.69.3-r8
  • H
Allocation of Resources Without Limits or Throttling

<0.69.3-r8
  • L
GHSA-5w89-2c2x-6x66

<0.69.3-r8
  • L
GHSA-x4jj-h2v8-hqqv

<0.69.3-r8
  • H
Improper Certificate Validation

<0.69.3-r8
  • L
GHSA-m4pr-4j3g-9v7v

<0.69.3-r8
  • L
CVE-2026-32280

<0.69.3-r8
  • M
Allocation of Resources Without Limits or Throttling

<0.69.3-r8
  • L
GHSA-7mr4-xjxg-34g6

<0.69.3-r8
  • L
GHSA-4vrq-3vrq-g6gg

<0.69.3-r6
  • L
Integer Underflow

<0.69.3-r6
  • H
Directory Traversal

<0.69.3-r6
  • C
Directory Traversal

<0.69.3-r6
  • L
GHSA-gm2x-2g9h-ccm8

<0.69.3-r6
  • L
Improper Validation of Array Index

<0.69.3-r6
  • L
GHSA-jhf3-xxhw-2wpp

<0.69.3-r6
  • L
GHSA-4c29-8rgm-jvjj

<0.69.3-r6
  • L
CVE-2026-27141

<0.69.3-r5
  • L
Improper Authorization

<0.69.3-r5
  • L
GHSA-p77j-4mvh-x3m3

<0.69.3-r5
  • L
GHSA-8fj7-8h3w-xwfm

<0.69.3-r5
  • L
GHSA-p436-gjf2-799p

<0.69.3-r4
  • H
CVE-2025-15558

<0.69.3-r4
  • L
Untrusted Search Path

<0.69.1-r3
  • L
GHSA-9h8m-3fm2-qjrq

<0.69.1-r3
  • L
GHSA-q9hv-hpm4-hj6x

<0.69.1-r2
  • C
CVE-2026-1229

<0.69.1-r2
  • L
GHSA-37cx-329c-33x3

<0.69.1-r1
  • M
Improper Validation of Integrity Check Value

<0.69.1-r1
  • L
GHSA-jqc5-w2xx-5vq4

<0.69.0-r0
  • L
GHSA-273p-m2cw-6833

<0.68.2-r2
  • L
Directory Traversal

<0.69.0-r0
  • L
GHSA-fphv-w9fq-2525

<0.69.0-r0
  • L
GHSA-846p-jg2w-w324

<0.69.0-r0
  • H
Improper Verification of Cryptographic Signature

<0.69.0-r0
  • L
GHSA-4c4x-jm2x-pf9j

<0.68.2-r2
  • L
GHSA-fcv2-xgw5-pqxf

<0.69.0-r0
  • H
Reachable Assertion

<0.69.0-r0
  • M
Directory Traversal

<0.69.0-r0
  • L
Server-Side Request Forgery (SSRF)

<0.68.2-r2
  • L
NULL Pointer Dereference

<0.68.2-r2
  • L
Race Condition

<0.67.2-r1
  • L
GHSA-6v2p-p543-phr9

<0.60.0-r1
  • L
GHSA-hcg3-q754-cr77

<0.60.0-r2
  • L
GHSA-4f8r-qqr9-fq8j

<0.67.2-r1
  • L
CVE-2025-58181

<0.67.2-r4
  • L
GHSA-j5w8-q4qc-rx2x

<0.67.2-r4
  • M
Memory Leak

<0.67.2-r3
  • H
Incorrect Execution-Assigned Permissions

<0.67.2-r3
  • H
Symlink Following

<0.67.2-r2
  • L
Algorithmic Complexity

<0.67.2-r1
  • L
CVE-2025-47910

<0.66.0-r1
  • L
Allocation of Resources Without Limits or Throttling

<0.65.0-r5
  • L
CVE-2025-8959

<0.65.0-r3
  • L
Use of Uninitialized Resource

<0.65.0-r2
  • L
Allocation of Resources Without Limits or Throttling

<0.65.0-r2
  • L
Race Condition

<0.65.0-r1
  • M
Missing Initialization of Resource

<0.64.1-r3
  • H
Arbitrary Code Injection

<0.64.1-r1
  • L
CVE-2025-4673

<0.63.0-r1
  • L
CVE-2025-22874

<0.63.0-r1
  • L
Arbitrary Code Injection

<0.62.1-r0
  • L
CVE-2025-22872

<0.61.1-r0
  • L
Allocation of Resources Without Limits or Throttling

<0.61.0-r1
  • L
Stack-based Buffer Overflow

<0.61.0-r1
  • L
CVE-2025-22871

<0.61.0-r1
  • L
Asymmetric Resource Consumption (Amplification)

<0.60.0-r5
  • L
CVE-2024-34158

<0.60.0-r4
  • H
Integer Overflow or Wraparound

<0.60.0-r4
  • L
CVE-2024-34155

<0.60.0-r4
  • L
CVE-2024-34156

<0.60.0-r4
  • L
CVE-2025-22870

<0.60.0-r3
  • L
CVE-2025-22869

<0.60.0-r2
  • L
CVE-2025-22868

<0.60.0-r1
  • L
Allocation of Resources Without Limits or Throttling

<0.59.1-r1
  • L
CVE-2025-22866

<0.59.1-r0
  • L
Arbitrary Argument Injection

<0.58.1-r1
  • L
Resource Exhaustion

<0.58.1-r1
  • L
CVE-2024-45338

<0.58.0-r2
  • L
CVE-2024-45337

<0.58.0-r1
  • L
Improper Handling of Exceptional Conditions

<0.57.0-r1
  • L
CVE-2024-41110

<0.54.0-r0
  • H
CVE-2024-6257

<0.52.2-r1
  • M
Race Condition

<0.52.1-r1
  • C
CVE-2024-24790

<0.52.0-r2
  • M
CVE-2024-24789

<0.52.0-r2
  • L
CVE-2024-24788

<0.51.1-r1
  • L
CVE-2024-24787

<0.51.1-r1
  • L
CVE-2023-45288

<0.50.1-r1
  • H
Origin Validation Error

<0.50.0-r1
  • H
Incorrect Resource Transfer Between Spheres

<0.50.0-r1
  • L
CVE-2024-24786

<0.49.1-r5
  • H
Use of Uninitialized Resource

<0.49.1-r2
  • M
Directory Traversal

<0.49.1-r1
  • M
Improper Check for Unusual or Exceptional Conditions

<0.49.0-r1
  • H
Race Condition

<0.49.0-r1
  • C
Incorrect Authorization

<0.49.0-r1
  • C
Directory Traversal

<0.49.0-r1
  • H
Exposure of Resource to Wrong Sphere

<0.49.0-r0
  • M
Improper Validation of Integrity Check Value

<0.48.1-r0