Netapp

Snapdrive

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 4.4%
  • Veröffentlicht 07.12.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:41

Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

Exploit
  • EPSS 3.54%
  • Veröffentlicht 07.12.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:41

Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.

Exploit
  • EPSS 9.27%
  • Veröffentlicht 05.12.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:40

Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

  • EPSS 9.26%
  • Veröffentlicht 29.10.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:50

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in Ope...

Exploit
  • EPSS 15.07%
  • Veröffentlicht 07.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:44:24

In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.

  • EPSS 71.13%
  • Veröffentlicht 13.11.2017 22:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL ser...

  • EPSS 0.48%
  • Veröffentlicht 07.02.2017 17:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

NetApp SnapDrive for Windows before 7.0.2P4, 7.0.3, and 7.1 before 7.1.3P1 allows remote attackers to obtain sensitive information via unspecified vectors.

Medienbericht Exploit
  • EPSS 0.36%
  • Veröffentlicht 21.09.2016 02:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The TLS protocol 1.2 and earlier supports the rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh, and ecdsa_fixed_ecdh values for ClientCertificateType but does not directly document the ability to compute the master secret in certain situations with a clien...