ceph vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ceph package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Insufficient Verification of Data Authenticity

*
  • M
Cross-site Scripting (XSS)

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Directory Traversal

*
  • H
Directory Traversal

*
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • H
Placement of User into Incorrect Group

*
  • H
Placement of User into Incorrect Group

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Resource Exhaustion

*
  • L
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Improper Authentication

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Improper Preservation of Permissions

*
  • H
Improper Authentication

*
  • M
Insufficiently Protected Credentials

*
  • H
Insufficiently Protected Credentials

*
  • M
Authentication Bypass

*
  • M
Cleartext Storage of Sensitive Information

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
HTTP Response Splitting

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Preservation of Permissions

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Improper Authorization

*