ceph-mds vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ceph-mds package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • H
Cross-site Scripting (XSS)

*
  • M
Information Exposure

*
  • H
Improper Input Validation

*
  • H
Improper Input Validation

*
  • M
Least Privilege Violation

*
  • M
Least Privilege Violation

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Insufficient Verification of Data Authenticity

*
  • H
Insufficient Verification of Data Authenticity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
NULL Pointer Dereference

*
  • M
Directory Traversal

<2:16.2.10-266.el8cp
  • M
Allocation of Resources Without Limits or Throttling

<2:16.2.10-266.el8cp
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

<2:16.2.10-248.el8cp
  • M
Insufficient Granularity of Access Control

<2:16.2.10-248.el8cp
  • M
Resource Exhaustion

<2:16.2.10-266.el8cp
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Cleartext Storage of Sensitive Information

<2:14.2.11-95.el8cp
  • H
Improper Input Validation

<2:14.2.11-147.el8cp
  • M
Covert Timing Channel

<2:14.2.22-110.el8cp
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • H
Placement of User into Incorrect Group

*
  • H
Placement of User into Incorrect Group

<2:16.2.10-138.el8cp
  • M
Incorrect Authorization

<2:16.2.8-84.el8cp
  • M
Incorrect Authorization

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Overly Restrictive Regular Expression

*
  • M
Overly Restrictive Regular Expression

*
  • M
Directory Traversal

*
  • M
Directory Traversal

<2:16.2.10-94.el8cp
  • M
Improper Authentication

<2:14.2.22-110.el8cp
  • M
Improper Authentication

<2:16.2.7-98.el8cp
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Cross-site Scripting (XSS)

<2:14.2.11-181.el8cp
  • M
Improper Input Validation

<2:14.2.22-110.el8cp
  • M
Improper Input Validation

<2:16.2.7-98.el8cp
  • H
Improper Authentication

<2:14.2.11-181.el8cp
  • H
Insufficiently Protected Credentials

<2:14.2.11-181.el8cp
  • H
Insufficiently Protected Credentials

<2:14.2.11-95.el8cp
  • M
Authentication Bypass

<2:14.2.8-115.el8cp
  • M
Reusing a Nonce

<2:14.2.8-111.el8cp
  • H
Cleartext Storage of Sensitive Information

<2:14.2.11-147.el8cp
  • M
Cross-site Scripting (XSS)

<2:14.2.8-81.el8cp
  • M
HTTP Response Splitting

<2:14.2.8-81.el8cp
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Memory Leak

*
  • M
Improper Input Validation

<2:16.2.7-98.el8cp
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*