librados-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the librados-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Insufficient Verification of Data Authenticity

*
  • H
Insufficient Verification of Data Authenticity

*
  • H
Insufficient Verification of Data Authenticity

*
  • H
Insufficient Verification of Data Authenticity

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
NULL Pointer Dereference

*
  • M
Directory Traversal

<2:16.2.10-266.el8cp
  • M
Allocation of Resources Without Limits or Throttling

<2:16.2.10-266.el8cp
  • C
Directory Traversal

<2:18.2.1-194.el8cp
  • C
Resource Exhaustion

<2:18.2.1-194.el8cp
  • C
CVE-2023-4822

<2:18.2.1-194.el8cp
  • C
Authentication Bypass by Primary Weakness

<2:18.2.1-194.el8cp
  • M
NULL Pointer Dereference

*
  • C
Directory Traversal

<2:17.2.6-216.el8cp
  • M
Improper Input Validation

<2:16.2.10-248.el8cp
  • M
Insufficient Granularity of Access Control

<2:16.2.10-248.el8cp
  • M
Resource Exhaustion

<2:16.2.10-266.el8cp
  • M
Inefficient Regular Expression Complexity

*
  • M
Inefficient Regular Expression Complexity

*
  • H
Cleartext Storage of Sensitive Information

<2:14.2.11-95.el8cp
  • H
Improper Input Validation

<2:14.2.11-147.el8cp
  • M
Covert Timing Channel

<2:14.2.22-110.el8cp
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • H
Placement of User into Incorrect Group

*
  • H
Placement of User into Incorrect Group

<2:16.2.10-138.el8cp
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

<2:16.2.8-84.el8cp
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • L
Cross-site Scripting (XSS)

*
  • L
Cross-site Scripting (XSS)

*
  • M
Overly Restrictive Regular Expression

*
  • M
Overly Restrictive Regular Expression

*
  • M
Directory Traversal

<2:16.2.10-94.el8cp
  • M
Directory Traversal

*
  • M
Improper Authentication

<2:14.2.22-110.el8cp
  • M
Improper Authentication

<2:16.2.7-98.el8cp
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Cross-site Scripting (XSS)

<2:14.2.11-181.el8cp
  • M
Improper Input Validation

<2:16.2.7-98.el8cp
  • M
Improper Input Validation

<2:14.2.22-110.el8cp
  • H
Improper Authentication

<2:14.2.11-181.el8cp
  • H
Insufficiently Protected Credentials

<2:14.2.11-181.el8cp
  • H
Insufficiently Protected Credentials

<2:14.2.11-95.el8cp
  • H
Authentication Bypass

<2:14.2.11-95.el8cp
  • M
Reusing a Nonce

<2:14.2.8-111.el8cp
  • H
Cleartext Storage of Sensitive Information

<2:14.2.11-147.el8cp
  • M
Cross-site Scripting (XSS)

<2:14.2.8-81.el8cp
  • M
HTTP Response Splitting

<2:14.2.8-81.el8cp
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Memory Leak

*
  • M
Improper Input Validation

<2:16.2.7-98.el8cp
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*