bktree-fast vulnerabilities
As an example, a common strategy for de-duplicating images is to compute perceptual hashes for each of the images and compare those hashes with each other. Such hashes are small compared with the images (often 32, 64, 128 bits). If the hashing function is
-
latest version
0.0.7
-
latest non vulnerable version
-
first published
4 years ago
-
latest version published
4 years ago
-
licenses detected
- >=0
Direct Vulnerabilities
No direct vulnerabilities have been found for this package in Snyk’s vulnerability database. This does not include vulnerabilities belonging to this package’s dependencies.
Does your project rely on vulnerable package dependencies?Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities (in both your packages & their dependencies) and provides automated fixes for free.
Package versions
1 - 7 of 7 Results