Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cloud_backup
(Netapp)Repositories |
• https://github.com/openbsd/src
• https://github.com/torvalds/linux • https://github.com/madler/zlib • https://github.com/openssh/openssh-portable |
#Vulnerabilities | 342 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2018-10-08 | CVE-2018-18065 | _set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. | Ubuntu_linux, Debian_linux, Net\-Snmp, Cloud_backup, Data_ontap, E\-Series_santricity_os_controller, Hyper_converged_infrastructure, Solidfire_element_os, Storagegrid_webscale, Pan\-Os | 6.5 | ||
2019-01-16 | CVE-2018-5737 | A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive negative caching can in some cases cause undesirable behavior from named, such as a recursion loop or excessive logging. Deliberate exploitation of this condition could cause operational problems depending on the particular manifestation --... | Bind, Cloud_backup, Data_ontap_edge | 7.5 | ||
2019-01-16 | CVE-2018-5736 | An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession. This defect could be deliberately exercised by an attacker who is permitted to cause a vulnerable server to initiate zone transfers (for example: by sending valid NOTIFY messages), causing the named process to exit after failing the assertion test. Affects BIND 9.12.0 and 9.12.1. | Bind, Cloud_backup, Data_ontap_edge | 5.3 | ||
2018-08-28 | CVE-2018-15919 | Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.' | Cloud_backup, Cn1610_firmware, Data_ontap_edge, Ontap_select_deploy, Steelstore, Openssh | 5.3 |