Redhat

Storage

31 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Media report Exploit
  • EPSS 64.06%
  • Published 18.12.2023 16:15:10
  • Last modified 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

  • EPSS 0.58%
  • Published 06.11.2023 07:15:09
  • Last modified 21.11.2024 08:22:55

A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpc...

Exploit
  • EPSS 1.94%
  • Published 03.11.2023 13:15:08
  • Last modified 21.11.2024 08:18:24

A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services ...

  • EPSS 0.48%
  • Published 03.11.2023 08:15:08
  • Last modified 21.11.2024 08:34:22

A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows openi...

  • EPSS 0.42%
  • Published 20.07.2023 15:15:11
  • Last modified 06.12.2024 11:15:06

A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This ...

  • EPSS 2.2%
  • Published 20.07.2023 15:15:11
  • Last modified 06.12.2024 11:15:05

A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attack...

Exploit
  • EPSS 0.63%
  • Published 01.09.2022 21:15:09
  • Last modified 21.11.2024 07:01:00

A flaw was found in Keystone. There is a time lag (up to one hour in a default configuration) between when security policy says a token should be revoked from when it is actually revoked. This could allow a remote administrator to secretly maintain a...

  • EPSS 3.76%
  • Published 23.08.2022 16:15:09
  • Last modified 21.08.2025 17:57:42

MaxQueryDuration not honoured in Samba AD DC LDAP

Exploit
  • EPSS 86.08%
  • Published 21.03.2022 20:15:14
  • Last modified 21.11.2024 06:53:31

An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source cod...

  • EPSS 0.31%
  • Published 21.02.2022 18:15:08
  • Last modified 21.11.2024 06:30:25

All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has t...