etcd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the etcd package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
CVE-2025-4673

*
  • M
Misinterpretation of Input

*
  • M
Misinterpretation of Input

*
  • M
Misinterpretation of Input

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Uncontrolled Recursion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • M
Improper Input Validation

*
  • H
Improper Authentication

*
  • H
Memory Leak

*
  • H
Memory Leak

*
  • M
Unchecked Return Value

*
  • M
Unchecked Return Value

*
  • L
Race Condition

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Insufficient Granularity of Access Control

*
  • M
Insufficient Granularity of Access Control

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Improper Access Control

*
  • M
Improper Authentication

*
  • M
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Authentication

*
  • L
Improper Authentication

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Authorization

*
  • L
Improper Authorization

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Buffer Overflow

*
  • M
Incorrect Calculation

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*