cfme-gemset vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the cfme-gemset package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Access Control

<0:5.8.3.4-1.el7cf
  • H
Missing Authorization

<0:5.8.1.5-1.el7cf
  • H
Improper Access Control

<0:5.8.1.5-1.el7cf
  • H
Improper Access Control

<0:5.8.1.5-1.el7cf
  • H
Information Exposure

<0:5.8.1.5-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.9.0.22-1.el7cf
  • M
Improper Certificate Validation

<0:5.8.0.17-1.el7cf
  • M
Use of Hard-coded Credentials

<0:5.8.0.17-1.el7cf
  • H
Improper Input Validation

<0:5.8.2.3-1.el7cf
  • M
Improper Input Validation

<0:5.9.5.3-1.el7cf
  • H
Improper Access Control

<0:5.8.5.1-1.el7cf
  • H
Improper Access Control

<0:5.9.4.7-1.el7cf
  • H
Improper Input Validation

<0:5.9.2.4-1.el7cf
  • H
Improper Input Validation

<0:5.8.4.5-1.el7cf
  • H
Incorrect Privilege Assignment

<0:5.9.2.4-1.el7cf
  • H
Incorrect Privilege Assignment

<0:5.8.4.5-1.el7cf
  • H
Directory Traversal

<0:5.9.4.7-1.el7cf
  • H
Directory Traversal

<0:5.8.5.1-1.el7cf
  • M
Deserialization of Untrusted Data

<0:5.9.9.1-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.9.0.22-1.el7cf
  • H
Arbitrary Command Injection

<0:5.8.2.3-1.el7cf
  • M
Information Exposure Through Log Files

<0:5.9.3.4-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
XML External Entity (XXE) Injection

<0:5.10.0.33-1.el7cf
  • M
XML External Entity (XXE) Injection

<0:5.10.0.33-1.el7cf
  • M
Resource Exhaustion

*
  • M
Information Exposure

*
  • L
Information Exposure

*
  • M
Resource Exhaustion

*
  • L
Cross-site Request Forgery (CSRF)

*
  • M
Resource Exhaustion

*
  • M
Open Redirect

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Request Forgery (CSRF)

*
  • L
Improper Input Validation

*
  • L
Cross-site Scripting (XSS)

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Eval Injection

*
  • H
Improper Input Validation

<0:5.10.15.1-1.el7cf
  • H
Improper Input Validation

<0:5.10.15.1-1.el7cf
  • M
Information Exposure

*
  • L
OS Command Injection

*
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • L
Directory Traversal

*
  • C
OS Command Injection

<0:5.10.16.0-1.el7cf
  • C
OS Command Injection

<0:5.10.16.0-1.el7cf
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • C
Improper Authorization

<0:5.10.16.0-1.el7cf
  • C
Expected Behavior Violation

<0:5.10.16.0-1.el7cf
  • C
Expected Behavior Violation

<0:5.10.16.0-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • M
HTTP Response Splitting

*
  • M
Improper Authorization

<0:5.10.8.0-1.el7cf
  • M
Improper Authorization

<0:5.10.8.0-1.el7cf
  • L
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Improper Input Validation

<0:5.9.9.3-1.el7cf
  • H
Improper Input Validation

<0:5.10.3.3-1.el7cf
  • H
Improper Input Validation

<0:5.10.3.3-1.el7cf
  • H
Information Exposure

<0:5.9.9.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • H
Information Exposure

<0:5.10.3.3-1.el7cf
  • M
Resource Exhaustion

<0:5.10.13.1-1.el7cf
  • M
Resource Exhaustion

<0:5.10.13.1-1.el7cf
  • L
Man-in-the-Middle (MitM)

<0:5.10.1.2-1.el7cf
  • L
Man-in-the-Middle (MitM)

<0:5.10.1.2-1.el7cf
  • L
Reliance on Untrusted Inputs in a Security Decision

*
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.0.33-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.9.8.1-1.el7cf
  • H
Incorrect Authorization

<0:5.9.6.5-2.el7cf
  • H
Insecure Temporary File

<0:5.9.6.5-2.el7cf
  • H
Improper Authentication

<0:5.9.2.4-1.el7cf
  • H
Improper Authentication

<0:5.8.4.5-1.el7cf
  • H
Improper Initialization

<0:5.9.6.5-2.el7cf
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • M
Cross-site Scripting (XSS)

<0:5.10.9.1-1.el7cf
  • H
Improper Input Validation

<0:5.9.6.5-2.el7cf
  • H
Improper Input Validation

<0:5.10.5.1-1.el7cf
  • H
Improper Input Validation

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Arbitrary Argument Injection

<0:5.10.5.1-1.el7cf
  • H
Directory Traversal

<0:5.10.5.1-1.el7cf
  • H
Directory Traversal

<0:5.10.5.1-1.el7cf
  • L
Insecure Temporary File

<0:5.10.7.1-1.el7cf
  • L
Insecure Temporary File

<0:5.10.7.1-1.el7cf