Netapp

Ontap Select Deploy Administration Utility

179 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.81%
  • Veröffentlicht 31.08.2023 10:15:08
  • Zuletzt bearbeitet 21.11.2024 07:41:47

A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if ...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 22.08.2023 19:16:31
  • Zuletzt bearbeitet 21.11.2024 07:32:46

GNU Binutils before 2.40 was discovered to contain a memory leak vulnerability var the function find_abstract_instance in dwarf2.c.

Exploit
  • EPSS 0.01%
  • Veröffentlicht 22.08.2023 19:16:30
  • Zuletzt bearbeitet 21.11.2024 07:32:46

GNU Binutils before 2.40 was discovered to contain an excessive memory consumption vulnerability via the function bfd_dwarf2_find_nearest_line_with_alt at dwarf2.c. The attacker could supply a crafted ELF file and cause a DNS attack.

  • EPSS 0.11%
  • Veröffentlicht 25.07.2023 21:15:10
  • Zuletzt bearbeitet 13.02.2025 13:50:15

Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certific...

  • EPSS 1.34%
  • Veröffentlicht 17.07.2023 21:15:09
  • Zuletzt bearbeitet 21.11.2024 08:13:29

iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.

  • EPSS 0.2%
  • Veröffentlicht 14.07.2023 12:15:09
  • Zuletzt bearbeitet 23.04.2025 17:16:32

Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate e...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 19.04.2023 00:15:07
  • Zuletzt bearbeitet 12.05.2026 11:16:11

The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protect...

Exploit
  • EPSS 1.45%
  • Veröffentlicht 17.02.2023 15:15:12
  • Zuletzt bearbeitet 03.11.2025 22:16:05

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

Exploit
  • EPSS 3.62%
  • Veröffentlicht 15.02.2023 18:15:11
  • Zuletzt bearbeitet 19.03.2025 18:15:18

A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a s...

Exploit
  • EPSS 88.33%
  • Veröffentlicht 03.02.2023 06:15:09
  • Zuletzt bearbeitet 21.11.2024 07:49:10

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to an...