Vulnerabilities > Netapp > H410C Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-09-03 | CVE-2021-40490 | Race Condition vulnerability in multiple products A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13. | 7.0 |
2021-07-09 | CVE-2021-3541 | XML Entity Expansion vulnerability in multiple products A flaw was found in libxml2. | 4.0 |
2021-07-09 | CVE-2021-3612 | Out-of-bounds Write vulnerability in multiple products An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. | 7.8 |
2021-06-29 | CVE-2021-28691 | Use After Free vulnerability in multiple products Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet. | 4.6 |
2021-06-24 | CVE-2020-28097 | Out-of-bounds Read vulnerability in multiple products The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. | 3.6 |
2021-06-07 | CVE-2018-25015 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 4.14.16. | 4.6 |
2021-06-07 | CVE-2019-25045 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 5.0.19. | 4.6 |
2021-06-07 | CVE-2020-36387 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 5.8.2. | 7.8 |
2021-06-07 | CVE-2020-36385 | Use After Free vulnerability in multiple products An issue was discovered in the Linux kernel before 5.10. | 7.8 |
2021-05-26 | CVE-2020-27815 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. | 7.8 |