k3d vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the k3d package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-45337

<5.7.5-r1
  • L
GHSA-v778-237x-gjrc

<5.7.5-r1
  • L
GHSA-crqm-pwhx-j97f

<5.7.4-r0
  • L
CVE-2024-34155

<5.7.4-r0
  • L
GHSA-8xfx-rj4p-23jm

<5.7.4-r0
  • L
CVE-2024-34156

<5.7.4-r0
  • L
GHSA-j7vj-rw65-4v26

<5.7.4-r0
  • L
CVE-2024-34158

<5.7.4-r0
  • L
CVE-2024-41110

<5.7.2-r1
  • L
GHSA-v23v-6jw2-98fq

<5.7.2-r1
  • L
GHSA-xr7q-jx4m-x55m

<5.7.1-r1
  • L
CVE-2024-24791

<5.6.3-r5
  • L
GHSA-hw49-2p59-3mhj

<5.6.3-r5
  • L
GHSA-v6v8-xj6m-xwqh

<5.6.3-r4
  • M
Information Exposure Through Log Files

<5.6.3-r4
  • L
GHSA-236w-p7wf-5ph8

<5.6.3-r3
  • L
GHSA-49gw-vxvf-fc2g

<5.6.3-r3
  • C
CVE-2024-24790

<5.6.3-r3
  • M
CVE-2024-24789

<5.6.3-r3
  • L
CVE-2024-24788

<5.6.3-r2
  • L
GHSA-5fq7-4mxc-535h

<5.6.3-r2
  • L
CVE-2024-24787

<5.6.3-r2
  • L
GHSA-2jwv-jmq4-4j3r

<5.6.3-r2
  • L
GHSA-x84c-p2g9-rqv9

<5.6.3-r1
  • L
CVE-2024-32473

<5.6.3-r1
  • H
Incorrect Authorization

<5.6.0-r11
  • M
Uncontrolled Recursion

<5.6.0-r11
  • M
Use of Insufficiently Random Values

<5.6.0-r11
  • H
Insufficient Session Expiration

<5.6.0-r11
  • M
CVE-2021-4235

<5.6.0-r11
  • M
Cross-site Scripting (XSS)

<5.6.0-r11
  • M
Cross-site Scripting (XSS)

<5.6.0-r11
  • H
Allocation of Resources Without Limits or Throttling

<5.6.0-r11
  • L
GHSA-r88r-gmrh-7j83

<5.6.0-r11
  • L
GHSA-69cg-p879-7622

<5.6.0-r11
  • H
Improper Validation of Array Index

<5.6.0-r11
  • H
Resource Exhaustion

<5.6.0-r11
  • H
CVE-2023-1297

<5.6.0-r11
  • L
GHSA-vq4h-9ghm-qmrr

<5.6.0-r11
  • L
GHSA-vvpx-j8f3-3w6h

<5.6.0-r11
  • L
GHSA-83g2-8m93-v3w7

<5.6.0-r11
  • L
GHSA-6hw5-6gcx-phmw

<5.6.0-r11
  • L
GHSA-ppp9-7jff-5vj2

<5.6.0-r11
  • L
GHSA-c57c-7hrj-6q6v

<5.6.0-r11
  • M
Information Exposure

<5.6.0-r11
  • L
GHSA-f5pg-7wfw-84q9

<5.6.0-r11
  • L
GHSA-p782-xgp4-8hr8

<5.6.0-r11
  • L
GHSA-wxc4-f4m6-wwqv

<5.6.0-r11
  • L
GHSA-6239-28c2-9mrm

<5.6.0-r11
  • L
GHSA-hwc3-3qh6-r4gg

<5.6.0-r11
  • M
Inadequate Encryption Strength

<5.6.0-r11
  • L
GHSA-3vm4-22fp-5rfm

<5.6.0-r11
  • H
Improper Certificate Validation

<5.6.0-r11
  • M
Unchecked Return Value

<5.6.0-r11
  • H
Authentication Bypass

<5.6.0-r11
  • L
GHSA-gwc9-m7rh-j2ww

<5.6.0-r11
  • H
CVE-2022-27664

<5.6.0-r11
  • L
GHSA-39qc-96h7-956f

<5.6.0-r11
  • L
GHSA-r3w7-mfpm-c2vw

<5.6.0-r11
  • L
GHSA-69ch-w2m2-3vjp

<5.6.0-r11
  • L
GHSA-c3h9-896r-86jm

<5.6.0-r11
  • H
CVE-2021-43565

<5.6.0-r11
  • L
GHSA-76wf-9vgp-pj7w

<5.6.0-r11
  • M
Information Exposure

<5.6.0-r11
  • L
CVE-2024-2048

<5.6.0-r11
  • L
GHSA-m69r-9g56-7mv8

<5.6.0-r11
  • L
GHSA-m425-mq94-257g

<5.6.0-r11
  • M
Incorrect Permission Assignment for Critical Resource

<5.6.0-r11
  • L
GHSA-6jvc-q2x7-pchv

<5.6.0-r11
  • M
Improper Cross-boundary Removal of Sensitive Data

<5.6.0-r11
  • L
GHSA-6q6q-88xp-6f2r

<5.6.0-r11
  • L
GHSA-wmg5-g953-qqfw

<5.6.0-r11
  • L
GHSA-q7fx-wm2p-qfj8

<5.6.0-r11
  • L
GHSA-5rcv-m4m3-hfh7

<5.6.0-r11
  • L
GHSA-9v3w-w2jh-4hff

<5.6.0-r11
  • M
Improper Verification of Cryptographic Signature

<5.6.0-r11
  • L
GHSA-j2rp-gmqv-frhv

<5.6.0-r11
  • L
GHSA-ccw8-7688-vqx4

<5.6.0-r11
  • H
Improper Certificate Validation

<5.6.0-r11
  • L
GHSA-q6h7-4qgw-2j9p

<5.6.0-r11
  • H
Server-Side Request Forgery (SSRF)

<5.6.0-r11
  • L
GHSA-9mh8-9j64-443f

<5.6.0-r11
  • L
GHSA-8c26-wmh5-6g9v

<5.6.0-r11
  • L
GHSA-cjjc-xp8v-855w

<5.6.0-r11
  • L
GHSA-7f33-f4f5-xwgw

<5.6.0-r11
  • M
Missing Authorization

<5.6.0-r11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.6.0-r11
  • M
Improper Privilege Management

<5.6.0-r11
  • L
GHSA-8h2g-r292-j8xh

<5.6.0-r11
  • H
Improper Verification of Cryptographic Signature

<5.6.0-r11
  • M
CVE-2019-11254

<5.6.0-r11
  • L
Use of a Broken or Risky Cryptographic Algorithm

<5.6.0-r11
  • H
CVE-2021-36213

<5.6.0-r11
  • H
CVE-2022-41723

<5.6.0-r11
  • L
GHSA-v3hp-mcj5-pg39

<5.6.0-r11
  • L
GHSA-25gf-8qrr-g78r

<5.6.0-r11
  • L
GHSA-ffhg-7mh4-33c4

<5.6.0-r11
  • L
GHSA-4v7x-pqxf-cx7m

<5.6.0-r11
  • L
GHSA-gq98-53rq-qr5h

<5.6.0-r11
  • H
Origin Validation Error

<5.6.0-r11
  • H
NULL Pointer Dereference

<5.6.0-r11
  • L
GHSA-4qhc-v8r6-8vwm

<5.6.0-r11
  • H
Incorrect Permission Assignment for Critical Resource

<5.6.0-r11
  • M
Use of a Broken or Risky Cryptographic Algorithm

<5.6.0-r11
  • M
CVE-2023-0665

<5.6.0-r11
  • L
GHSA-86c6-3g63-5w64

<5.6.0-r11
  • H
Out-of-bounds Read

<5.6.0-r11
  • L
GHSA-qv95-g3gm-x542

<5.6.0-r11
  • L
GHSA-8xmx-h8rq-h94j

<5.6.0-r11
  • H
Allocation of Resources Without Limits or Throttling

<5.6.0-r11
  • L
GHSA-r5c5-pr8j-pfp7

<5.6.0-r11
  • L
GHSA-hgr8-6h9x-f7q9

<5.6.0-r11
  • M
Cryptographic Issues

<5.6.0-r11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.6.0-r11
  • H
Resource Exhaustion

<5.6.0-r11
  • L
GHSA-fp52-qw33-mfmw

<5.6.0-r11
  • M
SQL Injection

<5.6.0-r11
  • L
GHSA-23jv-v6qj-3fhh

<5.6.0-r11
  • H
CVE-2022-27191

<5.6.0-r11
  • H
Improper Certificate Validation

<5.6.0-r11
  • H
Missing Release of Resource after Effective Lifetime

<5.6.0-r11
  • L
CVE-2023-45288

<5.6.0-r11
  • L
GHSA-h86h-8ppg-mxmh

<5.6.0-r11
  • L
CVE-2024-2660

<5.6.0-r11
  • L
GHSA-38j9-7pp9-2hjw

<5.6.0-r11
  • H
Memory Leak

<5.6.0-r11
  • M
Improper Certificate Validation

<5.6.0-r11
  • L
GHSA-4qvx-qq5w-695p

<5.6.0-r11
  • L
GHSA-x3jr-pf6g-c48f

<5.6.0-r11
  • L
CVE-2024-24786

<5.6.0-r8
  • L
GHSA-8r3f-844c-mc37

<5.6.0-r8
  • L
CVE-2023-45290

<5.6.0-r7
  • L
GHSA-3q2c-pvp5-3cqp

<5.6.0-r7
  • L
CVE-2023-45289

<5.6.0-r7
  • L
GHSA-j6m3-gc37-6r6q

<5.6.0-r7
  • L
CVE-2024-24785

<5.6.0-r7
  • L
CVE-2024-24784

<5.6.0-r7
  • L
GHSA-rr6r-cfgf-gc6h

<5.6.0-r7
  • L
GHSA-32ch-6x54-q4h9

<5.6.0-r7
  • L
GHSA-fgq5-q76c-gx78

<5.6.0-r7
  • L
CVE-2024-24783

<5.6.0-r7
  • L
GHSA-4374-p667-p6c8

<5.6.0-r6
  • H
CVE-2023-44487

<5.6.0-r6
  • H
Exposure of Resource to Wrong Sphere

<5.6.0-r6
  • L
GHSA-jq35-85cj-fj4p

<5.6.0-r6
  • L
GHSA-45x7-px36-x8w8

<5.6.0-r6
  • L
GHSA-2wrh-6pvc-2jm9

<5.6.0-r6
  • M
Improper Validation of Integrity Check Value

<5.6.0-r6
  • L
GHSA-7ww5-4wqc-m92c

<5.6.0-r6
  • L
GHSA-qppj-fm5r-hxr3

<5.6.0-r6
  • H
Allocation of Resources Without Limits or Throttling

<5.6.0-r6
  • M
Cross-site Scripting (XSS)

<5.6.0-r6
  • L
GHSA-xr7r-f8xq-vfvv

<5.6.0-r6
  • L
GHSA-9f76-wg39-x86h

<5.6.0-r5
  • H
CVE-2023-45285

<5.6.0-r5
  • L
GHSA-5f94-vhjq-rpg8

<5.6.0-r5
  • M
CVE-2023-39326

<5.6.0-r5