etcd vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the etcd package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Misinterpretation of Input

*
  • M
Misinterpretation of Input

*
  • M
Misinterpretation of Input

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • L
Improper Verification of Cryptographic Signature

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Access Control

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Improperly Controlled Sequential Memory Allocation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Uncontrolled Recursion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Arbitrary Code Injection

*
  • M
Use of Uninitialized Variable

*
  • M
Use of Uninitialized Variable

*
  • M
Improper Input Validation

*
  • H
Improper Authentication

*
  • H
Memory Leak

*
  • H
Memory Leak

*
  • M
Unchecked Return Value

*
  • M
Unchecked Return Value

*
  • L
Race Condition

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Improper Input Validation

*
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Insufficient Granularity of Access Control

*
  • M
Insufficient Granularity of Access Control

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • L
Information Exposure

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Cross-site Request Forgery (CSRF)

*
  • M
Improper Access Control

*
  • M
Improper Authentication

*
  • M
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Authentication

*
  • L
Improper Authentication

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Improper Authorization

*
  • L
Improper Authorization

*
  • M
Resource Exhaustion

*
  • L
Resource Exhaustion

*
  • M
Buffer Overflow

*
  • M
Incorrect Calculation

*
  • H
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*