Direct Vulnerabilities

Known vulnerabilities in the zed package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-852m-cvvp-9p4w

<0.228.0-r3
  • C
Out-of-bounds Read

<0.228.0-r3
  • M
Out-of-Bounds

<0.228.0-r3
  • M
Incorrect Conversion between Numeric Types

<0.228.0-r3
  • L
Out-of-bounds Read

<0.228.0-r3
  • L
GHSA-jxhv-7h78-9775

<0.228.0-r3
  • M
Out-of-bounds Read

<0.228.0-r3
  • H
Uncaught Exception

<0.228.0-r3
  • M
Resource Exhaustion

<0.228.0-r3
  • L
GHSA-hx6p-xpx3-jvvv

<0.228.0-r3
  • L
GHSA-hc7m-r6v8-hg9q

<0.228.0-r3
  • L
GHSA-m9w2-8782-2946

<0.228.0-r3
  • M
Uncaught Exception

<0.228.0-r3
  • H
Out-of-bounds Read

<0.228.0-r3
  • L
GHSA-m758-wjhj-p3jq

<0.228.0-r3
  • H
Allocation of Resources Without Limits or Throttling

<0.228.0-r3
  • L
GHSA-qqfj-4vcm-26hv

<0.228.0-r3
  • L
GHSA-xx5w-cvp6-jv83

<0.228.0-r3
  • L
GHSA-q49f-xg75-m9xw

<0.228.0-r3
  • L
GHSA-6wgr-89rj-399p

<0.228.0-r3
  • L
GHSA-f984-pcp8-v2p7

<0.228.0-r3
  • H
Always-Incorrect Control Flow Implementation

<0.228.0-r3
  • L
GHSA-vc8c-j3xm-xj73

<0.228.0-r3
  • L
Uncontrolled Memory Allocation

<0.228.0-r3
  • L
GHSA-394w-hwhg-8vgm

<0.228.0-r3
  • L
Race Condition

<0.228.0-r3
  • L
GHSA-jhxm-h53p-jm7w

<0.228.0-r3
  • L
GHSA-243v-98vx-264h

<0.228.0-r3
  • M
Improper Validation of Array Index

<0.228.0-r3
  • M
Out-of-bounds Write

<0.228.0-r3
  • L
GHSA-9f94-5g5w-gf6r

<0.228.0-r1
  • L
GHSA-394x-vwmw-crm3

<0.228.0-r1
  • L
GHSA-hfpc-8r3f-gw53

<0.227.1-r1
  • L
GHSA-65p9-r9h6-22vj

<0.227.1-r1
  • L
GHSA-vw5v-4f2q-w9xf

<0.227.1-r1
  • L
GHSA-6xvm-j4wr-6v98

<0.226.5-r1
  • L
Uncaught Exception

<0.226.5-r1
  • L
GHSA-r6v5-fh4h-64xc

<0.224.5-r0
  • M
Stack-based Buffer Overflow

<0.224.5-r0
  • H
Integer Overflow to Buffer Overflow

<0.223.3-r0
  • L
GHSA-434x-w66g-qw3r

<0.223.3-r0
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0.223.3-r0
  • L
GHSA-h395-gr6q-cpjc

<0.223.3-r0
  • L
GHSA-j39j-6gw9-jw6h

<0.222.4-r1
  • L
GHSA-g59m-gf8j-gjf5

<0.219.4-r0
  • L
Operation on a Resource after Expiration or Release

<0.219.4-r0
  • L
GHSA-fm79-3f68-h2fc

<0.219.4-r0
  • C
Use of Uninitialized Resource

<0.218.6-r0
  • L
GHSA-hpcx-3pw8-g3j2

<0.218.6-r0
  • M
Improper Check or Handling of Exceptional Conditions

<0.218.6-r0
  • L
GHSA-9c48-w39g-hm26

<0.218.6-r0
  • M
Double Free

<0.181.6-r0
  • L
Use After Free

<0.171.6-r1
  • M
Information Exposure

<0.166.1-r0
  • L
Directory Traversal

<0.159.10-r1
  • C
Incomplete Blacklist

<0.159.10-r1
  • L
Time-of-check Time-of-use (TOCTOU)

<0.156.0-r1
  • L
Always-Incorrect Control Flow Implementation

<0.156.0-r1
  • L
CVE-2024-43806

<0.147.2-r0
  • H
CVE-2023-43669

<0.147.2-r0
  • H
Integer Overflow or Wraparound

<0.146.3-r0
  • M
CVE-2024-30266

<0.146.3-r0
  • C
Double Free

<0.146.3-r0