docker-stable-bash-completion vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the docker-stable-bash-completion package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2025-22869

<24.0.9_ce-150000.1.25.1
  • H
CVE-2025-22868

<24.0.9_ce-150000.1.25.1
  • M
Unprotected Alternate Channel

<24.0.9_ce-150000.1.25.1
  • M
Incorrect Resource Transfer Between Spheres

<24.0.9_ce-150000.1.25.1
  • H
Race Condition

<24.0.9_ce-150000.1.25.1
  • H
Incorrect Authorization

<24.0.9_ce-150000.1.25.1
  • C
CVE-2024-41110

<24.0.9_ce-150000.1.25.1
  • M
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • H
CVE-2022-27191

<24.0.9_ce-150000.1.25.1
  • M
Missing Encryption of Sensitive Data

<24.0.9_ce-150000.1.25.1
  • M
Improper Check for Unusual or Exceptional Conditions

<24.0.9_ce-150000.1.25.1
  • M
CVE-2022-36109

<24.0.9_ce-150000.1.25.1
  • M
Improper Preservation of Permissions

<24.0.9_ce-150000.1.25.1
  • H
CVE-2021-43565

<24.0.9_ce-150000.1.25.1
  • H
Unprotected Alternate Channel

<24.0.9_ce-150000.1.25.1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • M
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • M
Improper Preservation of Permissions

<24.0.9_ce-150000.1.25.1
  • M
CVE-2020-8694

<24.0.9_ce-150000.1.25.1
  • L
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • M
Improper Check for Unusual or Exceptional Conditions

<24.0.9_ce-150000.1.25.1
  • M
Incorrect Permission Assignment for Critical Resource

<24.0.9_ce-150000.1.25.1
  • H
Incorrect Resource Transfer Between Spheres

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • M
Resource Exhaustion

<24.0.9_ce-150000.1.25.1
  • H
Improper Initialization

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure Through Log Files

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Improper Certificate Validation

<24.0.9_ce-150000.1.25.1
  • H
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • M
Execution with Unnecessary Privileges

<24.0.9_ce-150000.1.25.1
  • M
Race Condition

<24.0.9_ce-150000.1.25.1
  • M
Race Condition

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • L
Link Following

<24.0.9_ce-150000.1.25.1
  • H
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • H
Link Following

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • H
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • H
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • H
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • H
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • M
Link Following

<24.0.9_ce-150000.1.25.1
  • M
Code

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • M
CVE-2025-22872

<24.0.9_ce-150000.1.22.1
  • M
CVE-2025-0495

<24.0.9_ce-150000.1.22.1
  • H
CVE-2025-22869

<24.0.9_ce-150000.1.15.1
  • H
CVE-2025-22868

<24.0.9_ce-150000.1.15.1
  • C
CVE-2024-41110

<24.0.9_ce-150000.1.15.1
  • H
Incorrect Resource Transfer Between Spheres

<24.0.9_ce-150000.1.15.1
  • M
Improper Check for Unusual or Exceptional Conditions

<24.0.9_ce-150000.1.15.1
  • H
Incorrect Authorization

<24.0.9_ce-150000.1.8.1
  • C
CVE-2024-41110

<24.0.9_ce-150000.1.8.1
  • C
CVE-2024-41110

<24.0.9_ce-150000.1.5.1