zarf vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the zarf package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-v725-9546-7q7m

<0.45.0-r3
  • L
Resource Exhaustion

<0.45.0-r3
  • L
Arbitrary Argument Injection

<0.45.0-r3
  • L
GHSA-r9px-m959-cxf4

<0.45.0-r3
  • L
CVE-2024-45338

<0.45.0-r2
  • L
GHSA-w32m-9786-jp63

<0.45.0-r2
  • L
CVE-2024-45337

<0.45.0-r0
  • L
GHSA-v778-237x-gjrc

<0.45.0-r0
  • L
Improper Handling of Exceptional Conditions

<0.42.1-r2
  • L
GHSA-29wx-vh33-7x7r

<0.42.1-r2
  • H
Authentication Bypass

<0.40.1-r1
  • L
GHSA-c77r-fh37-x2px

<0.40.1-r1
  • L
CVE-2024-34158

<0.39.0-r1
  • L
CVE-2024-34155

<0.39.0-r1
  • L
GHSA-crqm-pwhx-j97f

<0.39.0-r1
  • L
GHSA-8xfx-rj4p-23jm

<0.39.0-r1
  • L
GHSA-j7vj-rw65-4v26

<0.39.0-r1
  • L
CVE-2024-34156

<0.39.0-r1
  • L
GHSA-v23v-6jw2-98fq

<0.38.0-r0
  • L
CVE-2024-41110

<0.38.0-r0
  • L
GHSA-xr7q-jx4m-x55m

<0.36.0-r1
  • L
CVE-2024-24791

<0.35.0-r3
  • L
GHSA-hw49-2p59-3mhj

<0.35.0-r3
  • L
CVE-2024-6257

<0.35.0-r2
  • L
GHSA-xfhp-jf8p-mh5w

<0.35.0-r2
  • L
GHSA-v6v8-xj6m-xwqh

<0.35.0-r1
  • M
Information Exposure Through Log Files

<0.35.0-r1
  • M
Race Condition

<0.34.0-r2
  • L
GHSA-m5vv-6r4h-3vj9

<0.34.0-r2
  • C
CVE-2024-24790

<0.34.0-r1
  • M
CVE-2024-24789

<0.34.0-r1
  • L
GHSA-49gw-vxvf-fc2g

<0.34.0-r1
  • L
GHSA-236w-p7wf-5ph8

<0.34.0-r1
  • L
Directory Traversal

<0.33.1-r1
  • L
GHSA-q64h-39hv-4cf7

<0.33.1-r1
  • L
GHSA-rhh4-rh7c-7r5v

<0.33.1-r1
  • L
CVE-2024-3817

<0.33.1-r1
  • L
GHSA-4v7x-pqxf-cx7m

<0.33.1-r1
  • L
GHSA-88jx-383q-w4qc

<0.33.0-r1
  • H
Allocation of Resources Without Limits or Throttling

<0.33.0-r1
  • L
CVE-2023-45288

<0.33.1-r1
  • M
Allocation of Resources Without Limits or Throttling

<0.33.0-r1
  • L
GHSA-95pr-fxf5-86gv

<0.33.0-r1
  • L
CVE-2024-28180

<0.32.4-r2
  • L
CVE-2024-24786

<0.32.5-r1
  • L
GHSA-8r3f-844c-mc37

<0.32.5-r1
  • L
GHSA-c5q2-7r4c-mv6g

<0.32.4-r2
  • L
GHSA-r53h-jv2g-vpx6

<0.32.4-r0
  • H
Use of Uninitialized Resource

<0.32.4-r0
  • L
GHSA-v53g-5gjp-272r

<0.32.3-r1
  • M
Directory Traversal

<0.32.3-r1
  • H
Exposure of Resource to Wrong Sphere

<0.32.3-r0
  • L
GHSA-xw73-rw38-6vjc

<0.32.3-r0
  • C
Directory Traversal

<0.32.3-r0
  • H
Origin Validation Error

<0.32.3-r0
  • L
GHSA-xr7r-f8xq-vfvv

<0.32.3-r0
  • L
GHSA-hpxr-w9w7-g4gv

<0.32.3-r0
  • L
GHSA-9763-4f94-gfch

<0.32.2-r0