bktree-fast vulnerabilities

As an example, a common strategy for de-duplicating images is to compute perceptual hashes for each of the images and compare those hashes with each other. Such hashes are small compared with the images (often 32, 64, 128 bits). If the hashing function is

Direct Vulnerabilities

No direct vulnerabilities have been found for this package in Snyk’s vulnerability database. This does not include vulnerabilities belonging to this package’s dependencies.

Does your project rely on vulnerable package dependencies?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities (in both your packages & their dependencies) and provides automated fixes for free.

Scan for indirect vulnerabilities

Package versions

1 - 7 of 7 Results
version published direct vulnerabilities
0.0.7 14 Apr, 2020
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.0.6 20 Mar, 2020
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.0.5 17 Mar, 2020
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.0.4 17 Mar, 2020
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.0.3 17 Mar, 2020
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.0.2 17 Mar, 2020
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.0.1 17 Mar, 2020
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L