Direct Vulnerabilities

Known vulnerabilities in the ceph-mon package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
Improper Validation of Certificate with Host Mismatch

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Improper Validation of Syntactic Correctness of Input

*
  • L
CVE-2025-58186

*
  • M
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • M
Improper Output Neutralization for Logs

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • H
Link Following

*
  • M
Improper Verification of Source of a Communication Channel

*
  • M
CVE-2025-68121

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Cross-site Scripting (XSS)

*
  • H
Allocation of Resources Without Limits or Throttling

<2:19.2.1-331.el9cp
  • H
Improper Certificate Validation

<2:19.2.1-331.el9cp
  • H
Inefficient Regular Expression Complexity

<2:19.2.1-331.el9cp
  • H
Exposure of Resource to Wrong Sphere

<2:19.2.1-331.el9cp
  • H
Allocation of Resources Without Limits or Throttling

*
  • H
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

*
  • H
Cross-site Scripting (XSS)

*
  • M
Improper Verification of Source of a Communication Channel

*
  • H
Improper Input Validation

*
  • M
Least Privilege Violation

*
  • M
Cross-site Scripting (XSS)

*
  • H
Insufficient Verification of Data Authenticity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
Incorrect Authorization

<2:16.2.8-84.el9cp
  • M
Resource Exhaustion

*
  • L
Cross-site Scripting (XSS)

*
  • M
Overly Restrictive Regular Expression

*
  • M
Overly Restrictive Regular Expression

*
  • M
Out-of-bounds Read

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*