Known Vulnerabilities for Cloud Manager by Netapp

Listed below are 10 of the newest known vulnerabilities associated with "Cloud Manager" by "Netapp".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2021-28165 In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receivi... 7.5 - HIGH 2021-04-01 2022-07-29
CVE-2021-28164 In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e... 5.3 - MEDIUM 2021-04-01 2022-07-14
CVE-2021-28163 In Eclipse Jetty 9.4.32 to 9.4.38, 10.0.0.beta2 to 10.0.1, and 11.0.0.beta2 to 11.0.1, if a user uses a webapps directory tha... 2.7 - LOW 2021-04-01 2022-05-12
CVE-2021-27002 NetApp Cloud Manager versions prior to 3.9.10 are susceptible to a vulnerability which could allow a remote unauthenticated a... 7.5 - HIGH 2021-10-11 2021-10-18
CVE-2021-26999 NetApp Cloud Manager versions prior to 3.9.9 log sensitive information when an Active Directory connection fails. The logged ... 4.3 - MEDIUM 2021-08-06 2022-06-28
CVE-2021-26998 NetApp Cloud Manager versions prior to 3.9.9 log sensitive information that is available only to authenticated users. Custome... 4.3 - MEDIUM 2021-08-06 2022-06-28
CVE-2021-26992 Cloud Manager versions prior to 3.9.4 are susceptible to a vulnerability which could allow a remote attacker to cause a Denia... 7.5 - HIGH 2021-03-19 2021-03-23
CVE-2021-26991 Cloud Manager versions prior to 3.9.4 contain an insecure Cross-Origin Resource Sharing (CORS) policy which could allow a rem... 7.5 - HIGH 2021-03-19 2021-03-23
CVE-2021-26990 Cloud Manager versions prior to 3.9.4 are susceptible to a vulnerability that could allow a remote attacker to overwrite arbi... 9.1 - CRITICAL 2021-03-19 2021-03-23
CVE-2021-23337 Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. 7.2 - HIGH 2021-02-15 2022-09-13

Popular searches for Cloud Manager

Cloud Manager for Hybrid Cloud Data Management | NetApp

www.netapp.com/cloud-services/cloud-manager

Cloud Manager for Hybrid Cloud Data Management | NetApp Cloud Manager from NetApp simplifies loud n l j storage, providing monitoring, administration and orchestration for ONTAP storage on-premises and in the loud

www.netapp.com/us/products/data-infrastructure-management/cloud-manager.aspx www.netapp.com/us/products/data-infrastructure-management/cloud-manager.aspx www.netapp.mx/cloud-services/cloud-manager Cloud computing NetApp Data management HTTP cookie Computer data storage ONTAP On-premises software Cloud storage Fabric computing Orchestration (computing) Privacy policy Web browser Software as a service Artificial intelligence Videotelephony Microsoft Azure Amazon Web Services Google Cloud Platform Network monitoring Online and offline

NetApp Cloud Manager - Hybrid Cloud Storage for the Enterprise

cloud.netapp.com/cloud-manager

B >NetApp Cloud Manager - Hybrid Cloud Storage for the Enterprise Cloud Manager simplifies loud n l j storage, providing monitoring, administration and orchestration for ONTAP storage on-premises and in the loud

cloud.netapp.com/fabric-orchestrator cloud.netapp.com/data-fabric-toolset Cloud computing Cloud storage NetApp Computer data storage ONTAP On-premises software Amazon Web Services Microsoft Azure Orchestration (computing) Information technology Software as a service Provisioning (telecommunications) Computing platform Automation Data User (computing) Google Cloud Platform Data management Representational state transfer Backup

© CVE.report 2022 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report