Direct Vulnerabilities

Known vulnerabilities in the ceph package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Insufficient Granularity of Access Control

<12.2.11+dfsg1-2.1+deb10u1
  • M
Improper Authentication

<12.2.11+dfsg1-2.1+deb10u1
  • M
Improper Input Validation

<12.2.11+dfsg1-2.1+deb10u1
  • M
Improper Input Validation

<12.2.11+dfsg1-2.1+deb10u1
  • H
Improper Authentication

<12.2.11+dfsg1-2.1+deb10u1
  • H
Insufficiently Protected Credentials

<12.2.11+dfsg1-2.1+deb10u1
  • M
Cleartext Storage of Sensitive Information

<12.2.11+dfsg1-2.1+deb10u1
  • M
HTTP Response Splitting

<12.2.11+dfsg1-2.1+deb10u1
  • H
NULL Pointer Dereference

<12.2.11+dfsg1-2.1+deb10u1
  • M
Cross-site Scripting (XSS)

<12.2.11+dfsg1-2.1+deb10u1
  • M
Resource Exhaustion

<12.2.11+dfsg1-2.1+deb10u1
  • H
Improper Handling of Exceptional Conditions

<12.2.11+dfsg1-2.1+deb10u1
  • L
Information Exposure

<12.2.11+dfsg1-1
  • M
Incorrect Permission Assignment for Critical Resource

<12.2.11+dfsg1-1
  • M
Allocation of Resources Without Limits or Throttling

<12.2.11+dfsg1-1
  • H
Improper Authentication

<12.2.8+dfsg1-1
  • H
Improper Authentication

<12.2.8+dfsg1-1
  • M
Improper Authentication

<12.2.8+dfsg1-1
  • H
Improper Input Validation

<10.2.5-2
  • M
Improper Input Validation

<10.2.5-1
  • M
Use of Externally-Controlled Format String

<12.2.8+dfsg1-1
  • H
Information Exposure

<10.2.5-1
  • M
Improper Input Validation

<10.2.5-1
  • M
CVE-2015-5245

<0.80.10-1