Netapp

Cloud Backup

344 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.96%
  • Veröffentlicht 12.11.2020 18:15:17
  • Zuletzt bearbeitet 21.11.2024 05:39:23

Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

  • EPSS 0.22%
  • Veröffentlicht 12.11.2020 18:15:16
  • Zuletzt bearbeitet 21.11.2024 05:39:21

Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access.

  • EPSS 0.15%
  • Veröffentlicht 12.11.2020 18:15:14
  • Zuletzt bearbeitet 21.11.2024 04:59:33

Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.

  • EPSS 0.36%
  • Veröffentlicht 12.11.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 04:53:48

Improper input validation in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.

  • EPSS 0.38%
  • Veröffentlicht 06.11.2020 08:15:13
  • Zuletzt bearbeitet 21.11.2024 05:22:27

MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.

  • EPSS 0.19%
  • Veröffentlicht 10.09.2020 14:15:17
  • Zuletzt bearbeitet 21.11.2024 05:17:41

get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount...

  • EPSS 0.51%
  • Veröffentlicht 20.08.2020 01:17:13
  • Zuletzt bearbeitet 21.11.2024 05:06:19

Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.

  • EPSS 0.06%
  • Veröffentlicht 20.08.2020 01:17:13
  • Zuletzt bearbeitet 21.11.2024 05:06:19

Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.

Exploit
  • EPSS 0.93%
  • Veröffentlicht 19.08.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:05

A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.

  • EPSS 0.16%
  • Veröffentlicht 20.07.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:18

An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes ...