druid vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the druid package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-4cx2-fc23-5wg6

<34.0.0-r6
  • L
CVE-2025-8916

<34.0.0-r6
  • H
HTTP Request Smuggling

<34.0.0-r4
  • L
GHSA-fghv-69vj-qj49

<34.0.0-r4
  • L
GHSA-3p8m-j85q-pgmj

<34.0.0-r3
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<34.0.0-r3
  • L
GHSA-prj3-ccx8-p6x4

<34.0.0-r1
  • H
Allocation of Resources Without Limits or Throttling

<34.0.0-r1
  • L
CVE-2025-22227

<33.0.0-r8
  • L
GHSA-4q2v-9p7v-3v22

<33.0.0-r8
  • L
CVE-2025-27817

<33.0.0-r4
  • L
GHSA-vgq5-3255-v292

<33.0.0-r4
  • L
GHSA-2c59-37c4-qrx5

<32.0.1-r2
  • C
Deserialization of Untrusted Data

<32.0.1-r2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<32.0.0-r6
  • L
GHSA-mfj5-cf8g-g2fv

<32.0.0-r6
  • L
Privilege Defined With Unsafe Actions

<32.0.0-r6
  • L
GHSA-m5vv-6r4h-3vj9

<32.0.1-r1
  • H
Allocation of Resources Without Limits or Throttling

<33.0.0-r1
  • L
GHSA-973x-65j7-xcf4

<32.0.1-r1
  • H
Integer Overflow or Wraparound

<32.0.0-r6
  • L
GHSA-xrj7-x7gp-wwqr

<32.0.1-r1
  • L
GHSA-wmcc-9vch-jmx4

<32.0.0-r6
  • L
GHSA-g2fg-mr77-6vrm

<32.0.0-r6
  • H
Improper Certificate Validation

<32.0.1-r1
  • C
Incorrect Permission Assignment for Critical Resource

<32.0.0-r6
  • H
Allocation of Resources Without Limits or Throttling

<33.0.0-r1
  • L
GHSA-qcwq-55hx-v3vh

<33.0.0-r1
  • L
GHSA-pqr6-cmr2-h8hf

<32.0.0-r6
  • H
Resource Exhaustion

<32.0.0-r6
  • M
File and Directory Information Exposure

<32.0.0-r6
  • L
GHSA-wjxj-f8rg-99wx

<32.0.1-r1
  • H
CVE-2023-50298

<32.0.1-r1
  • L
GHSA-vx85-mj8c-4qm6

<32.0.0-r6
  • M
Race Condition

<32.0.1-r1
  • L
GHSA-55g7-9cwv-5qfv

<33.0.0-r1
  • L
GHSA-fjpj-2g6w-x25r

<32.0.0-r6
  • L
Improper Authentication

<32.0.0-r6
  • L
GHSA-8ffc-79xg-29w8

<32.0.0-r6
  • L
CVE-2024-36114

<32.0.1-r1
  • H
Integer Overflow or Wraparound

<32.0.0-r6
  • L
GHSA-rj7p-rfgp-852x

<32.0.0-r6
  • L
GHSA-4g8c-wm8x-jfhw

<32.0.0-r5
  • L
CVE-2025-24970

<32.0.0-r5
  • C
Arbitrary Code Injection

<32.0.1-r1
  • L
GHSA-rcjc-c4pj-xxrp

<32.0.1-r1
  • L
GHSA-2x2g-32r7-p4x8

<31.0.0-r2
  • L
Improper Privilege Management

<31.0.0-r2
  • L
GHSA-g8m5-722r-8whq

<31.0.0-r1
  • M
Allocation of Resources Without Limits or Throttling

<31.0.0-r1
  • M
CVE-2024-45384

<30.0.1-r0
  • L
GHSA-p72w-r6fv-6g5h

<30.0.1-r0