Netapp

Data Ontap Edge

23 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 8.62%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:01:44

An error in handling certain queries can cause an assertion failure when a server is using the nxdomain-redirect feature to cover a zone for which it is also providing authoritative service. A vulnerable server could be intentionally stopped by an at...

  • EPSS 1.23%
  • Published 28.08.2018 08:29:00
  • Last modified 21.11.2024 03:51:43

Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not w...

Exploit
  • EPSS 90.29%
  • Published 17.08.2018 19:29:00
  • Last modified 21.11.2024 03:50:53

OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-...

Exploit
  • EPSS 15.07%
  • Published 07.06.2018 13:29:00
  • Last modified 21.11.2024 03:44:24

In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.

  • EPSS 0.59%
  • Published 18.05.2018 16:29:00
  • Last modified 21.11.2024 03:42:58

An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

  • EPSS 0.89%
  • Published 18.05.2018 16:29:00
  • Last modified 21.11.2024 03:42:57

stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer over...

  • EPSS 0.73%
  • Published 01.02.2018 14:29:00
  • Last modified 21.11.2024 04:10:45

An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to ...

  • EPSS 3.2%
  • Published 21.01.2018 22:29:00
  • Last modified 21.11.2024 02:44:33

sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.

  • EPSS 69.1%
  • Published 13.11.2017 22:29:00
  • Last modified 20.04.2025 01:37:25

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL ser...

  • EPSS 2.76%
  • Published 26.10.2017 03:29:00
  • Last modified 20.04.2025 01:37:25

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.