Direct Vulnerabilities

Known vulnerabilities in the zarf package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-78h2-9frx-2jm8

<0.74.1-r1
  • H
Authentication Bypass

<0.74.1-r0
  • L
Uncaught Exception

<0.74.1-r1
  • L
GHSA-x744-4wpc-v9h2

<0.74.1-r0
  • L
GHSA-pxq6-2prw-chj9

<0.74.1-r0
  • H
Off-by-one Error

<0.74.1-r0
  • L
Improper Validation of Array Index

<0.74.0-r2
  • L
GHSA-gm2x-2g9h-ccm8

<0.74.0-r2
  • L
Integer Underflow

<0.74.0-r2
  • L
GHSA-jhf3-xxhw-2wpp

<0.74.0-r2
  • L
GHSA-rjcw-vg7j-m9rc

<0.74.0-r1
  • L
Improper Cleanup on Thrown Exception

<0.74.0-r1
  • L
Improper Authorization

<0.74.0-r0
  • L
GHSA-p77j-4mvh-x3m3

<0.74.0-r0
  • L
CVE-2026-27142

<0.73.1-r3
  • L
GHSA-j3gx-2473-5fp8

<0.73.1-r3
  • L
CVE-2026-25679

<0.73.1-r3
  • L
CVE-2026-27139

<0.73.1-r3
  • L
GHSA-j4j7-vw47-rhfq

<0.73.1-r3
  • L
GHSA-rv83-g57w-fr8j

<0.73.1-r3
  • L
GHSA-273p-m2cw-6833

<0.70.1-r3
  • C
CVE-2026-1229

<0.73.0-r1
  • L
GHSA-j5w8-q4qc-rx2x

<0.66.0-r1
  • L
GHSA-q9hv-hpm4-hj6x

<0.73.0-r1
  • M
Server-Side Request Forgery (SSRF)

<0.70.1-r0
  • L
Server-Side Request Forgery (SSRF)

<0.70.1-r3
  • L
GHSA-f9f8-9pmf-xv68

<0.60.0-r1
  • L
Resource Exhaustion

<0.45.0-r3
  • L
GHSA-8fj7-8h3w-xwfm

<0.73.1-r1
  • L
GHSA-4hfp-h4cw-hj8p

<0.51.0-r1
  • L
CVE-2025-22872

<0.52.0-r0
  • L
CVE-2026-27141

<0.73.1-r1
  • L
GHSA-pwhc-rpq9-4c8w

<0.65.1-r1
  • L
CVE-2025-58181

<0.66.0-r1
  • L
GHSA-rwvp-r38j-9rgg

<0.63.0-r2
  • L
GHSA-f6x5-jh6r-wrfv

<0.66.0-r1
  • L
Arbitrary Argument Injection

<0.45.0-r3
  • L
GHSA-59jp-pj84-45mr

<0.70.1-r0
  • L
CVE-2025-47914

<0.66.0-r1
  • L
GHSA-fcv2-xgw5-pqxf

<0.70.1-r4
  • L
Use of Uninitialized Resource

<0.60.0-r1
  • L
GHSA-9h84-qmv7-982p

<0.60.0-r1
  • L
GHSA-v725-9546-7q7m

<0.45.0-r3
  • L
Race Condition

<0.65.1-r1
  • L
CVE-2025-22870

<0.49.1-r2
  • M
CVE-2025-11579

<0.63.0-r2
  • L
Allocation of Resources Without Limits or Throttling

<0.60.0-r1
  • L
GHSA-6v2p-p543-phr9

<0.49.1-r1
  • L
Allocation of Resources Without Limits or Throttling

<0.49.0-r2
  • L
GHSA-29wx-vh33-7x7r

<0.42.1-r2
  • L
GHSA-w32m-9786-jp63

<0.45.0-r2
  • L
Asymmetric Resource Consumption (Amplification)

<0.50.0-r1
  • L
Directory Traversal

<0.70.1-r4
  • L
CVE-2025-22868

<0.49.1-r1
  • L
GHSA-5xqw-8hwv-wg92

<0.51.0-r1
  • L
CVE-2024-45337

<0.45.0-r0
  • L
GHSA-37cx-329c-33x3

<0.71.1-r1
  • M
Improper Validation of Integrity Check Value

<0.71.1-r1
  • L
GHSA-m6hq-p25p-ffr2

<0.65.1-r1
  • L
GHSA-x4rx-4gw3-53p4

<0.59.0-r1
  • L
GHSA-557j-xg8c-q2mm

<0.57.0-r2
  • M
Missing Initialization of Resource

<0.59.0-r1
  • H
Authentication Bypass

<0.40.1-r1
  • H
Arbitrary Code Injection

<0.57.0-r2
  • H
Reachable Assertion

<0.70.1-r2
  • L
GHSA-f83f-xpx7-ffpw

<0.68.1-r0
  • L
GHSA-v778-237x-gjrc

<0.45.0-r0
  • H
Incorrect Execution-Assigned Permissions

<0.65.1-r1
  • H
Improper Verification of Cryptographic Signature

<0.70.1-r2
  • L
CVE-2024-34156

<0.39.0-r1
  • L
Asymmetric Resource Consumption (Amplification)

<0.68.1-r0
  • L
CVE-2024-45338

<0.45.0-r2
  • L
Untrusted Search Path

<0.73.0-r2
  • L
GHSA-4qg8-fj49-pxjh

<0.68.1-r0
  • L
NULL Pointer Dereference

<0.70.1-r3
  • L
GHSA-cgrx-mc8f-2prm

<0.65.1-r2
  • L
GHSA-9h8m-3fm2-qjrq

<0.73.0-r2
  • L
GHSA-4c4x-jm2x-pf9j

<0.70.1-r3
  • L
CVE-2025-22866

<0.48.1-r0
  • L
Asymmetric Resource Consumption (Amplification)

<0.68.1-r0
  • L
GHSA-8xfx-rj4p-23jm

<0.39.0-r1
  • H
Integer Overflow or Wraparound

<0.49.1-r3
  • L
GHSA-c6gw-w398-hv78

<0.49.0-r2
  • H
Symlink Following

<0.65.1-r2
  • L
Allocation of Resources Without Limits or Throttling

<0.51.0-r1
  • L
GHSA-crqm-pwhx-j97f

<0.39.0-r1
  • L
Stack-based Buffer Overflow

<0.51.0-r1
  • M
Open Redirect

<0.50.0-r0
  • L
Allocation of Resources Without Limits or Throttling

<0.61.0-r1
  • L
GHSA-fv92-fjc5-jj9h

<0.57.0-r1
  • L
Improper Handling of Exceptional Conditions

<0.42.1-r2
  • L
GHSA-c77r-fh37-x2px

<0.40.1-r1
  • L
GHSA-265r-hfxg-fhmg

<0.49.1-r3
  • L
GHSA-qxp5-gwg8-xv66

<0.49.1-r2
  • L
GHSA-jc7w-c686-c4v9

<0.61.0-r1
  • L
GHSA-j7vj-rw65-4v26

<0.39.0-r1
  • L
GHSA-vvgc-356p-c3xw

<0.52.0-r0
  • L
GHSA-jqc5-w2xx-5vq4

<0.70.1-r4
  • L
Improper Cross-boundary Removal of Sensitive Data

<0.67.0-r0
  • L
GHSA-wjrx-6529-hcj3

<0.60.0-r2
  • L
GHSA-fphv-w9fq-2525

<0.70.1-r2
  • L
CVE-2025-8959

<0.60.0-r2
  • L
GHSA-846p-jg2w-w324

<0.70.1-r2
  • M
Directory Traversal

<0.70.1-r4
  • L
GHSA-4f8r-qqr9-fq8j

<0.65.1-r1
  • L
GHSA-6gxw-85q2-q646

<0.67.0-r0
  • L
GHSA-33c5-9fx5-fvjm

<0.50.0-r0
  • L
GHSA-3whm-j4xm-rv8x

<0.48.1-r0
  • M
Memory Leak

<0.65.1-r1
  • L
CVE-2024-34158

<0.39.0-r1
  • L
GHSA-r9px-m959-cxf4

<0.45.0-r3
  • L
CVE-2024-34155

<0.39.0-r1
  • L
GHSA-mh63-6h87-95cp

<0.50.0-r1
  • L
GHSA-v23v-6jw2-98fq

<0.38.0-r0
  • L
CVE-2024-41110

<0.38.0-r0
  • L
GHSA-xr7q-jx4m-x55m

<0.36.0-r1
  • L
CVE-2024-24791

<0.35.0-r3
  • L
GHSA-hw49-2p59-3mhj

<0.35.0-r3
  • L
GHSA-xfhp-jf8p-mh5w

<0.35.0-r2
  • H
CVE-2024-6257

<0.35.0-r2
  • L
GHSA-v6v8-xj6m-xwqh

<0.35.0-r1
  • M
Information Exposure Through Log Files

<0.35.0-r1
  • L
GHSA-m5vv-6r4h-3vj9

<0.34.0-r2
  • M
Race Condition

<0.34.0-r2
  • C
CVE-2024-24790

<0.34.0-r1
  • M
CVE-2024-24789

<0.34.0-r1
  • L
GHSA-49gw-vxvf-fc2g

<0.34.0-r1
  • L
GHSA-236w-p7wf-5ph8

<0.34.0-r1
  • L
CVE-2024-3817

<0.33.1-r1
  • L
GHSA-q64h-39hv-4cf7

<0.33.1-r1
  • H
Directory Traversal

<0.33.1-r1
  • L
GHSA-rhh4-rh7c-7r5v

<0.33.1-r1
  • H
Allocation of Resources Without Limits or Throttling

<0.33.0-r1
  • L
GHSA-95pr-fxf5-86gv

<0.33.0-r1
  • L
CVE-2023-45288

<0.33.1-r1
  • M
Allocation of Resources Without Limits or Throttling

<0.33.0-r1
  • L
GHSA-4v7x-pqxf-cx7m

<0.33.1-r1
  • L
GHSA-88jx-383q-w4qc

<0.33.0-r1
  • L
GHSA-8r3f-844c-mc37

<0.32.5-r1
  • L
CVE-2024-24786

<0.32.5-r1
  • L
CVE-2024-28180

<0.32.4-r2
  • L
GHSA-c5q2-7r4c-mv6g

<0.32.4-r2
  • H
Use of Uninitialized Resource

<0.32.4-r0
  • L
GHSA-r53h-jv2g-vpx6

<0.32.4-r0
  • L
GHSA-v53g-5gjp-272r

<0.32.3-r1
  • M
Directory Traversal

<0.32.3-r1
  • L
GHSA-xw73-rw38-6vjc

<0.32.3-r0
  • C
Directory Traversal

<0.32.3-r0
  • H
Origin Validation Error

<0.32.3-r0
  • L
GHSA-xr7r-f8xq-vfvv

<0.32.3-r0
  • H
Exposure of Resource to Wrong Sphere

<0.32.3-r0
  • L
GHSA-hpxr-w9w7-g4gv

<0.32.3-r0
  • L
GHSA-9763-4f94-gfch

<0.32.2-r0