Netapp

Clustered Data Ontap

144 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Published 23.09.2022 14:15:12
  • Last modified 05.05.2025 17:18:16

When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service...

Exploit
  • EPSS 1.4%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:12

A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...

Exploit
  • EPSS 2.57%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:13

curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...

Exploit
  • EPSS 0.17%
  • Published 07.07.2022 13:15:08
  • Last modified 23.04.2025 18:15:53

When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...

Exploit
  • EPSS 0.3%
  • Published 07.07.2022 13:15:08
  • Last modified 05.05.2025 17:18:13

When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.

  • EPSS 32.2%
  • Published 09.06.2022 17:15:09
  • Last modified 01.05.2025 15:35:56

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apach...

  • EPSS 0.29%
  • Published 09.06.2022 17:15:09
  • Last modified 21.11.2024 06:57:35

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled an...

  • EPSS 0.73%
  • Published 09.06.2022 17:15:09
  • Last modified 01.05.2025 15:35:44

Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, th...

  • EPSS 1.54%
  • Published 09.06.2022 17:15:09
  • Last modified 21.11.2024 06:59:01

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.

  • EPSS 20.63%
  • Published 09.06.2022 17:15:09
  • Last modified 21.11.2024 07:02:52

If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.