ceph vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ceph package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Insufficient Verification of Data Authenticity

*
  • H
Insufficient Verification of Data Authenticity

*
  • H
Insufficient Verification of Data Authenticity

*
  • H
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
HTTP Request Smuggling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Placement of User into Incorrect Group

*
  • M
Placement of User into Incorrect Group

*
  • H
Placement of User into Incorrect Group

*
  • H
Placement of User into Incorrect Group

*
  • M
Overly Restrictive Regular Expression

*
  • M
Overly Restrictive Regular Expression

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Preservation of Permissions

*
  • L
Improper Preservation of Permissions

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
HTTP Response Splitting

*
  • M
HTTP Response Splitting

*
  • M
HTTP Response Splitting

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Authorization

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Access Control

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Insufficiently Protected Credentials

*
  • H
Insufficiently Protected Credentials

*
  • H
Insufficiently Protected Credentials

*
  • H
Improper Authentication

*
  • H
Improper Authentication

*
  • H
Improper Authentication

*
  • M
Memory Leak

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • H
Directory Traversal

*
  • H
Directory Traversal

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Reusing a Nonce

*
  • M
Reusing a Nonce

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Authentication Bypass

*
  • M
Authentication Bypass

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Authentication Bypass

*
  • M
Authentication Bypass

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*