Netapp

Element Software

100 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7.37%
  • Veröffentlicht 28.01.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:05

Incorrect sanitation of the 302 redirect field in HTTP transport method of apt versions 1.4.8 and earlier can lead to content injection by a MITM attacker, potentially leading to remote code execution on the target machine.

  • EPSS 20.4%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:55

If named is configured to use Response Policy Zones (RPZ) an error processing some rule types can lead to a condition where BIND will endlessly loop while handling a query. Affects BIND 9.9.10, 9.10.5, 9.11.0->9.11.1, 9.9.10-S1, 9.10.5-S1.

  • EPSS 18.55%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:54

named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has create...

  • EPSS 34.71%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:54

Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which record...

  • EPSS 38.17%
  • Veröffentlicht 16.01.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:54

A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use...

  • EPSS 0.17%
  • Veröffentlicht 14.01.2019 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:32

It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 11.01.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:28

An out of bounds read was discovered in systemd-journald in the way it parses log messages that terminate with a colon ':'. A local attacker can use this flaw to disclose process memory data. Versions from v221 to v239 are vulnerable.

  • EPSS 3.74%
  • Veröffentlicht 10.01.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:59

In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.

  • EPSS 9.26%
  • Veröffentlicht 29.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:50

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in Ope...

  • EPSS 0.09%
  • Veröffentlicht 21.09.2018 16:29:01
  • Zuletzt bearbeitet 21.11.2024 03:53:01

An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.