k3d vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the k3d package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
GHSA-x84c-p2g9-rqv9

<5.6.3-r1
  • L
CVE-2024-32473

<5.6.3-r1
  • L
GHSA-83g2-8m93-v3w7

<5.6.0-r11
  • L
GHSA-38j9-7pp9-2hjw

<5.6.0-r11
  • M
Missing Authorization

<5.6.0-r11
  • L
GHSA-6hw5-6gcx-phmw

<5.6.0-r11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.6.0-r11
  • H
Resource Exhaustion

<5.6.0-r11
  • H
CVE-2023-1297

<5.6.0-r11
  • L
GHSA-vq4h-9ghm-qmrr

<5.6.0-r11
  • L
GHSA-5rcv-m4m3-hfh7

<5.6.0-r11
  • H
Incorrect Authorization

<5.6.0-r11
  • M
Inadequate Encryption Strength

<5.6.0-r11
  • M
Information Exposure

<5.6.0-r11
  • L
GHSA-wmg5-g953-qqfw

<5.6.0-r11
  • M
Information Exposure

<5.6.0-r11
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<5.6.0-r11
  • L
GHSA-8h2g-r292-j8xh

<5.6.0-r11
  • L
GHSA-8xmx-h8rq-h94j

<5.6.0-r11
  • L
GHSA-vvpx-j8f3-3w6h

<5.6.0-r11
  • H
CVE-2022-41723

<5.6.0-r11
  • H
Improper Certificate Validation

<5.6.0-r11
  • H
Server-Side Request Forgery (SSRF)

<5.6.0-r11
  • H
Out-of-bounds Read

<5.6.0-r11
  • H
Resource Exhaustion

<5.6.0-r11
  • L
GHSA-qv95-g3gm-x542

<5.6.0-r11
  • H
NULL Pointer Dereference

<5.6.0-r11
  • M
SQL Injection

<5.6.0-r11
  • H
Missing Release of Resource after Effective Lifetime

<5.6.0-r11
  • L
GHSA-86c6-3g63-5w64

<5.6.0-r11
  • L
GHSA-69ch-w2m2-3vjp

<5.6.0-r11
  • L
GHSA-wxc4-f4m6-wwqv

<5.6.0-r11
  • M
CVE-2021-4235

<5.6.0-r11
  • H
Allocation of Resources Without Limits or Throttling

<5.6.0-r11
  • L
GHSA-c57c-7hrj-6q6v

<5.6.0-r11
  • L
GHSA-fp52-qw33-mfmw

<5.6.0-r11
  • L
GHSA-3vm4-22fp-5rfm

<5.6.0-r11
  • L
GHSA-7f33-f4f5-xwgw

<5.6.0-r11
  • L
GHSA-cjjc-xp8v-855w

<5.6.0-r11
  • L
GHSA-9v3w-w2jh-4hff

<5.6.0-r11
  • L
GHSA-q7fx-wm2p-qfj8

<5.6.0-r11
  • L
GHSA-c3h9-896r-86jm

<5.6.0-r11
  • H
CVE-2022-27664

<5.6.0-r11
  • L
GHSA-m425-mq94-257g

<5.6.0-r11
  • L
GHSA-6q6q-88xp-6f2r

<5.6.0-r11
  • L
GHSA-h86h-8ppg-mxmh

<5.6.0-r11
  • H
Allocation of Resources Without Limits or Throttling

<5.6.0-r11
  • H
Incorrect Permission Assignment for Critical Resource

<5.6.0-r11
  • L
Use of a Broken or Risky Cryptographic Algorithm

<5.6.0-r11
  • L
GHSA-q6h7-4qgw-2j9p

<5.6.0-r11
  • L
GHSA-4qvx-qq5w-695p

<5.6.0-r11
  • L
GHSA-8c26-wmh5-6g9v

<5.6.0-r11
  • L
GHSA-r5c5-pr8j-pfp7

<5.6.0-r11
  • L
GHSA-j2rp-gmqv-frhv

<5.6.0-r11
  • M
Cryptographic Issues

<5.6.0-r11
  • L
GHSA-4qhc-v8r6-8vwm

<5.6.0-r11
  • M
Improper Certificate Validation

<5.6.0-r11
  • H
Authentication Bypass

<5.6.0-r11
  • L
GHSA-23jv-v6qj-3fhh

<5.6.0-r11
  • H
CVE-2022-27191

<5.6.0-r11
  • L
GHSA-9mh8-9j64-443f

<5.6.0-r11
  • M
Incorrect Permission Assignment for Critical Resource

<5.6.0-r11
  • L
GHSA-v3hp-mcj5-pg39

<5.6.0-r11
  • M
Improper Verification of Cryptographic Signature

<5.6.0-r11
  • L
GHSA-25gf-8qrr-g78r

<5.6.0-r11
  • M
Improper Cross-boundary Removal of Sensitive Data

<5.6.0-r11
  • L
CVE-2023-45288

<5.6.0-r11
  • L
GHSA-p782-xgp4-8hr8

<5.6.0-r11
  • M
Cross-site Scripting (XSS)

<5.6.0-r11
  • M
CVE-2019-11254

<5.6.0-r11
  • L
GHSA-6239-28c2-9mrm

<5.6.0-r11
  • L
GHSA-4v7x-pqxf-cx7m

<5.6.0-r11
  • M
Improper Privilege Management

<5.6.0-r11
  • H
CVE-2021-36213

<5.6.0-r11
  • L
GHSA-x3jr-pf6g-c48f

<5.6.0-r11
  • L
GHSA-f5pg-7wfw-84q9

<5.6.0-r11
  • L
GHSA-hgr8-6h9x-f7q9

<5.6.0-r11
  • M
Uncontrolled Recursion

<5.6.0-r11
  • L
GHSA-gwc9-m7rh-j2ww

<5.6.0-r11
  • H
Improper Certificate Validation

<5.6.0-r11
  • L
GHSA-ffhg-7mh4-33c4

<5.6.0-r11
  • H
Improper Verification of Cryptographic Signature

<5.6.0-r11
  • L
GHSA-hwc3-3qh6-r4gg

<5.6.0-r11
  • H
Improper Validation of Array Index

<5.6.0-r11
  • L
GHSA-76wf-9vgp-pj7w

<5.6.0-r11
  • M
CVE-2023-0665

<5.6.0-r11
  • L
GHSA-m69r-9g56-7mv8

<5.6.0-r11
  • H
CVE-2021-43565

<5.6.0-r11
  • L
GHSA-69cg-p879-7622

<5.6.0-r11
  • L
GHSA-6jvc-q2x7-pchv

<5.6.0-r11
  • L
GHSA-r3w7-mfpm-c2vw

<5.6.0-r11
  • M
Cross-site Scripting (XSS)

<5.6.0-r11
  • H
Improper Certificate Validation

<5.6.0-r11
  • L
CVE-2024-2048

<5.6.0-r11
  • L
GHSA-gq98-53rq-qr5h

<5.6.0-r11
  • M
Use of a Broken or Risky Cryptographic Algorithm

<5.6.0-r11
  • L
CVE-2024-2660

<5.6.0-r11
  • M
Unchecked Return Value

<5.6.0-r11
  • H
Memory Leak

<5.6.0-r11
  • L
GHSA-ccw8-7688-vqx4

<5.6.0-r11
  • L
GHSA-39qc-96h7-956f

<5.6.0-r11
  • M
Use of Insufficiently Random Values

<5.6.0-r11
  • H
Origin Validation Error

<5.6.0-r11
  • L
GHSA-r88r-gmrh-7j83

<5.6.0-r11
  • L
GHSA-ppp9-7jff-5vj2

<5.6.0-r11
  • H
Insufficient Session Expiration

<5.6.0-r11
  • L
CVE-2024-24786

<5.6.0-r8
  • L
GHSA-8r3f-844c-mc37

<5.6.0-r8
  • L
GHSA-3q2c-pvp5-3cqp

<5.6.0-r7
  • L
CVE-2023-45290

<5.6.0-r7
  • L
CVE-2024-24785

<5.6.0-r7
  • L
CVE-2023-45289

<5.6.0-r7
  • L
CVE-2024-24784

<5.6.0-r7
  • L
CVE-2024-24783

<5.6.0-r7
  • L
GHSA-j6m3-gc37-6r6q

<5.6.0-r7
  • L
GHSA-32ch-6x54-q4h9

<5.6.0-r7
  • L
GHSA-fgq5-q76c-gx78

<5.6.0-r7
  • L
GHSA-rr6r-cfgf-gc6h

<5.6.0-r7
  • L
GHSA-45x7-px36-x8w8

<5.6.0-r6
  • L
GHSA-7ww5-4wqc-m92c

<5.6.0-r6
  • H
Exposure of Resource to Wrong Sphere

<5.6.0-r6
  • L
GHSA-xr7r-f8xq-vfvv

<5.6.0-r6
  • L
GHSA-4374-p667-p6c8

<5.6.0-r6
  • M
Cross-site Scripting (XSS)

<5.6.0-r6
  • L
GHSA-2wrh-6pvc-2jm9

<5.6.0-r6
  • M
Improper Validation of Integrity Check Value

<5.6.0-r6
  • L
GHSA-jq35-85cj-fj4p

<5.6.0-r6
  • H
Allocation of Resources Without Limits or Throttling

<5.6.0-r6
  • M
CVE-2023-39326

<5.6.0-r5
  • L
GHSA-9f76-wg39-x86h

<5.6.0-r5
  • L
GHSA-5f94-vhjq-rpg8

<5.6.0-r5
  • H
CVE-2023-45285

<5.6.0-r5