falco vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the falco package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-88jx-383q-w4qc

<0.37.1-r0
  • L
GHSA-xw73-rw38-6vjc

<0.37.1-r0
  • H
Origin Validation Error

<0.37.1-r0
  • L
CVE-2024-29902

<0.37.1-r0
  • L
CVE-2024-24786

<0.37.1-r0
  • L
GHSA-95pr-fxf5-86gv

<0.37.1-r0
  • L
GHSA-4v7x-pqxf-cx7m

<0.37.1-r0
  • L
CVE-2024-29903

<0.37.1-r0
  • L
GHSA-8r3f-844c-mc37

<0.37.1-r0
  • L
CVE-2023-45288

<0.37.1-r0
  • L
CVE-2023-45290

<0.37.1-r0
  • L
GHSA-rr6r-cfgf-gc6h

<0.37.1-r0
  • L
CVE-2023-45289

<0.37.1-r0
  • L
CVE-2024-24784

<0.37.1-r0
  • L
GHSA-fgq5-q76c-gx78

<0.37.1-r0
  • L
GHSA-3q2c-pvp5-3cqp

<0.37.1-r0
  • L
GHSA-j6m3-gc37-6r6q

<0.37.1-r0
  • L
GHSA-32ch-6x54-q4h9

<0.37.1-r0
  • L
CVE-2024-24783

<0.37.1-r0
  • L
CVE-2024-24785

<0.37.1-r0
  • L
CVE-2024-28122

<0.37.1-r0
  • L
GHSA-hj3v-m684-v259

<0.37.1-r0
  • L
CVE-2024-28180

<0.37.1-r0
  • L
GHSA-c5q2-7r4c-mv6g

<0.37.1-r0
  • L
GHSA-888h-rm2r-vrc7

<0.37.1-r0
  • L
GHSA-xc82-5m89-g4jv

<0.37.1-r0
  • L
GHSA-68g3-2p3g-w9pq

<0.37.1-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0.37.1-r0
  • H
Resource Exhaustion

<0.37.1-r0
  • L
GHSA-vfp6-jrw2-99g9

<0.37.1-r0
  • L
GHSA-v4m2-x4rp-hv22

<0.37.1-r0
  • L
GHSA-vq7j-gx56-rxjh

<0.37.1-r0
  • L
GHSA-679v-hh23-h5jh

<0.37.1-r0
  • H
Arbitrary Code Injection

<0.37.1-r0
  • L
GHSA-fp44-cj2j-3jhx

<0.37.1-r0
  • C
Arbitrary Code Injection

<0.37.1-r0
  • H
CVE-2023-39323

<0.37.1-r0
  • C
Arbitrary Code Injection

<0.37.1-r0
  • H
Allocation of Resources Without Limits or Throttling

<0.37.1-r0
  • H
CVE-2022-41723

<0.37.1-r0
  • H
Directory Traversal

<0.37.1-r0
  • H
CVE-2023-44487

<0.37.1-r0
  • M
CVE-2023-39326

<0.37.1-r0
  • L
GHSA-9763-4f94-gfch

<0.37.1-r0
  • L
GHSA-rxx3-4978-3cc9

<0.37.1-r0
  • L
GHSA-3q6h-q44p-xw88

<0.37.1-r0
  • L
GHSA-m425-mq94-257g

<0.37.1-r0
  • L
GHSA-vv9m-32rr-3g55

<0.37.1-r0
  • L
GHSA-89mw-w342-mqrr

<0.37.1-r0
  • L
GHSA-7qhm-5mxq-x7vp

<0.37.1-r0
  • L
GHSA-w4h2-22wh-m6jx

<0.37.1-r0
  • C
Arbitrary Code Injection

<0.37.1-r0
  • L
GHSA-45x7-px36-x8w8

<0.37.1-r0
  • H
Allocation of Resources Without Limits or Throttling

<0.37.1-r0
  • H
Exposure of Resource to Wrong Sphere

<0.37.1-r0
  • M
Resource Exhaustion

<0.37.1-r0
  • L
GHSA-2c7c-3mj9-8fqh

<0.37.1-r0
  • L
GHSA-8v5j-pwr7-w5f8

<0.37.1-r0
  • H
Integer Overflow or Wraparound

<0.37.1-r0
  • L
GHSA-qppj-fm5r-hxr3

<0.37.1-r0
  • H
Resource Exhaustion

<0.37.1-r0
  • L
GHSA-33qr-2xwr-95pw

<0.37.1-r0
  • M
Incorrect Calculation

<0.37.1-r0
  • L
GHSA-9f7g-gqwh-jpf5

<0.37.1-r0
  • L
GHSA-x2w5-7wp4-5qff

<0.37.1-r0
  • L
GHSA-9f76-wg39-x86h

<0.37.1-r0
  • L
GHSA-5f94-vhjq-rpg8

<0.37.1-r0
  • M
Improper Validation of Integrity Check Value

<0.37.1-r0
  • H
Information Exposure

<0.37.1-r0
  • C
CVE-2023-24540

<0.37.1-r0
  • L
GHSA-pvcr-v8j8-j5q3

<0.37.1-r0
  • M
Interpretation Conflict

<0.37.1-r0
  • L
GHSA-jq35-85cj-fj4p

<0.37.1-r0
  • H
Arbitrary Code Injection

<0.37.1-r0
  • L
GHSA-7f9x-gw85-8grf

<0.37.1-r0
  • L
GHSA-4374-p667-p6c8

<0.37.1-r0
  • C
Arbitrary Code Injection

<0.37.1-r0
  • M
Cross-site Scripting (XSS)

<0.37.1-r0
  • L
GHSA-fp86-2355-v99r

<0.37.1-r0
  • H
NULL Pointer Dereference

<0.37.1-r0
  • M
Cross-site Scripting (XSS)

<0.37.1-r0
  • H
Allocation of Resources Without Limits or Throttling

<0.37.1-r0
  • L
GHSA-vvpx-j8f3-3w6h

<0.37.1-r0
  • L
GHSA-f8f7-69v5-w4vx

<0.37.1-r0
  • L
GHSA-f2cj-5636-4j38

<0.37.1-r0
  • M
Resource Exhaustion

<0.37.1-r0
  • L
GHSA-c9hr-fvm9-7c49

<0.37.1-r0
  • H
CVE-2023-45285

<0.37.1-r0