docker-stable-zsh-completion vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the docker-stable-zsh-completion package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Incorrect Resource Transfer Between Spheres

<24.0.9_ce-150000.1.25.1
  • M
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • H
Incorrect Authorization

<24.0.9_ce-150000.1.25.1
  • H
Race Condition

<24.0.9_ce-150000.1.25.1
  • M
Unprotected Alternate Channel

<24.0.9_ce-150000.1.25.1
  • H
CVE-2022-27191

<24.0.9_ce-150000.1.25.1
  • H
CVE-2025-22868

<24.0.9_ce-150000.1.25.1
  • H
Unprotected Alternate Channel

<24.0.9_ce-150000.1.25.1
  • C
CVE-2024-41110

<24.0.9_ce-150000.1.25.1
  • M
Improper Check for Unusual or Exceptional Conditions

<24.0.9_ce-150000.1.25.1
  • H
CVE-2025-22869

<24.0.9_ce-150000.1.25.1
  • M
Incorrect Permission Assignment for Critical Resource

<24.0.9_ce-150000.1.25.1
  • M
Missing Encryption of Sensitive Data

<24.0.9_ce-150000.1.25.1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<24.0.9_ce-150000.1.25.1
  • M
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • M
Improper Preservation of Permissions

<24.0.9_ce-150000.1.25.1
  • M
CVE-2022-36109

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • M
Improper Check for Unusual or Exceptional Conditions

<24.0.9_ce-150000.1.25.1
  • M
Resource Exhaustion

<24.0.9_ce-150000.1.25.1
  • L
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • H
CVE-2021-43565

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Improper Preservation of Permissions

<24.0.9_ce-150000.1.25.1
  • M
CVE-2020-8694

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • H
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • H
Incorrect Resource Transfer Between Spheres

<24.0.9_ce-150000.1.25.1
  • H
Improper Initialization

<24.0.9_ce-150000.1.25.1
  • M
Improper Certificate Validation

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Execution with Unnecessary Privileges

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure

<24.0.9_ce-150000.1.25.1
  • M
Information Exposure Through Log Files

<24.0.9_ce-150000.1.25.1
  • M
Race Condition

<24.0.9_ce-150000.1.25.1
  • M
Race Condition

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • H
Link Following

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • H
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • M
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • H
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • L
Link Following

<24.0.9_ce-150000.1.25.1
  • H
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • H
Directory Traversal

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1
  • H
Improper Input Validation

<24.0.9_ce-150000.1.25.1
  • M
Link Following

<24.0.9_ce-150000.1.25.1
  • M
Code

<24.0.9_ce-150000.1.25.1
  • M
Access Restriction Bypass

<24.0.9_ce-150000.1.25.1