Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
8.1
CVE-2018-10861
- EPSS 0.58%
- Published 10.07.2018 14:29:00
- Last modified 21.11.2024 03:42:09
A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be a...
6.1
CVE-2018-1059
- EPSS 0.26%
- Published 24.04.2018 18:29:00
- Last modified 21.11.2024 03:59:05
The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing v...
7.5
CVE-2016-7031
- EPSS 0.74%
- Published 03.10.2016 18:59:12
- Last modified 12.04.2025 10:46:40
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.