Netapp

Active Iq Unified Manager

841 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Published 16.05.2022 21:15:07
  • Last modified 21.11.2024 06:41:01

An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.

  • EPSS 0.18%
  • Published 12.05.2022 20:15:15
  • Last modified 21.11.2024 06:47:42

In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model o...

Exploit
  • EPSS 0.29%
  • Published 06.05.2022 12:15:08
  • Last modified 21.11.2024 06:51:10

Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local in...

  • EPSS 0.95%
  • Published 06.05.2022 00:15:07
  • Last modified 21.11.2024 06:51:21

Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vuln...

  • EPSS 46.34%
  • Published 03.05.2022 16:15:18
  • Last modified 13.08.2025 14:15:28

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...

  • EPSS 0.13%
  • Published 03.05.2022 16:15:18
  • Last modified 05.05.2025 17:17:34

The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the res...

  • EPSS 0.06%
  • Published 03.05.2022 16:15:18
  • Last modified 21.11.2024 06:40:43

The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being s...

  • EPSS 0.28%
  • Published 03.05.2022 16:15:18
  • Last modified 05.05.2025 17:17:34

The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically de...

Exploit
  • EPSS 0.05%
  • Published 03.05.2022 03:15:06
  • Last modified 21.11.2024 06:59:45

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte...

  • EPSS 2.66%
  • Published 01.05.2022 16:15:08
  • Last modified 21.11.2024 06:52:30

The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.