Total vulnerabilities in the database
Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.
CVSS v3:
CVSS v2:
CWEs:
OWASP TOP 10: