k-rpc vulnerabilities

Low-level implementation of the k-rpc protocol used the BitTorrent DHT.

Package versions

32 VERSIONS IN TOTAL
versionpublisheddirect vulnerabilities
3.2.25 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
3.2.15 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
3.2.05 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
3.1.04 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
3.0.13 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
3.0.02 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
2.1.02 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
2.0.22 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
2.0.12 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
2.0.01 Jan, 2016
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.0.130 Dec, 2015
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.0.030 Dec, 2015
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Get started free