cfme-appliance-tools vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cfme-appliance-tools package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Cross-site Scripting (XSS)

<0:5.9.0.22-1.el7cf
  • M
Improper Input Validation

<0:5.9.5.3-1.el7cf
  • H
Improper Access Control

<0:5.9.4.7-1.el7cf
  • H
Improper Input Validation

<0:5.9.2.4-1.el7cf
  • H
Incorrect Privilege Assignment

<0:5.9.2.4-1.el7cf
  • H
Directory Traversal

<0:5.9.4.7-1.el7cf
  • M
Deserialization of Untrusted Data

<0:5.9.9.1-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.9.0.22-1.el7cf
  • M
Information Exposure Through Log Files

<0:5.9.3.4-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
XML External Entity (XXE) Injection

<0:5.10.0.33-1.el7cf
  • M
XML External Entity (XXE) Injection

<0:5.10.0.33-1.el7cf
  • H
Improper Input Validation

<0:5.10.15.1-1.el7cf
  • H
Improper Input Validation

<0:5.10.15.1-1.el7cf
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • C
OS Command Injection

<0:5.10.16.0-1.el7cf
  • C
OS Command Injection

<0:5.10.16.0-1.el7cf
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • C
Expected Behavior Violation

<0:5.10.16.0-1.el7cf
  • C
Expected Behavior Violation

<0:5.10.16.0-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • M
Improper Authorization

<0:5.10.8.0-1.el7cf
  • M
Improper Authorization

<0:5.10.8.0-1.el7cf
  • H
Improper Input Validation

<0:5.10.3.3-1.el7cf
  • H
Improper Input Validation

<0:5.10.3.3-1.el7cf
  • H
Improper Input Validation

<0:5.9.9.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • H
Information Exposure

<0:5.9.9.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • M
Resource Exhaustion

<0:5.10.13.1-1.el7cf
  • M
Resource Exhaustion

<0:5.10.13.1-1.el7cf
  • L
Man-in-the-Middle (MitM)

<0:5.10.1.2-1.el7cf
  • L
Man-in-the-Middle (MitM)

<0:5.10.1.2-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.9.8.1-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • H
Incorrect Authorization

<0:5.9.6.5-1.el7cf
  • H
Insecure Temporary File

<0:5.9.6.5-1.el7cf
  • H
Improper Authentication

<0:5.9.2.4-1.el7cf
  • H
Improper Initialization

<0:5.9.6.5-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • H
Improper Input Validation

<0:5.9.6.5-1.el7cf
  • H
Improper Input Validation

<0:5.10.5.1-1.el7cf
  • H
Improper Input Validation

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Directory Traversal

<0:5.10.5.1-1.el7cf
  • H
Directory Traversal

<0:5.10.5.1-1.el7cf
  • L
Insecure Temporary File

<0:5.10.7.1-1.el7cf
  • L
Insecure Temporary File

<0:5.10.7.1-1.el7cf