Netapp Security Vulnerabilities (CVEs)
Track 350 security vulnerabilities affecting Netapp products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
A vulnerability in NetApp ONTAP with snapshot locking enabled allows privileged remote attackers to set snapshot expiry times to 'none', potentially p...
Jan 12, 2026This is a reflected cross-site scripting (XSS) vulnerability in NetApp StorageGRID that allows attackers to execute malicious scripts in a privileged ...
Sep 19, 2025An unauthenticated attacker can exploit a Server-Side Request Forgery (SSRF) vulnerability in StorageGRID to change passwords for Grid Manager or Tena...
Sep 19, 2025This CVE describes a privilege escalation vulnerability in NetApp StorageGRID where authenticated attackers can discover Grid node names and IP addres...
Sep 19, 2025A local privilege escalation vulnerability exists in the SAN Host Utilities for Windows installer versions before 8.0. This allows authenticated local...
Aug 7, 2025A vulnerability in Oracle MySQL's mysqldump client allows low-privileged attackers with network access to potentially access or modify sensitive data....
Apr 15, 2025This vulnerability in Oracle MySQL Server allows high-privileged attackers with network access to cause a denial of service (DoS) by crashing or hangi...
Apr 15, 2025This vulnerability allows attackers to create malicious OOXML files (like Excel, Word, or PowerPoint documents) with duplicate zip entries that can ca...
Apr 9, 2025This CVE describes an insufficient validation vulnerability in PHP's header handling that could allow attackers to manipulate HTTP headers. When user-...
Mar 30, 2025This CVE describes a buffer size limitation vulnerability in PHP's HTTP redirect parsing. When PHP processes HTTP redirect responses, it truncates loc...
Mar 30, 2025This vulnerability allows authenticated SnapCenter Server users to escalate privileges to admin level on remote systems where SnapCenter plug-ins are ...
Mar 24, 2025Vim versions before 9.1.1198 contain a vulnerability in zip.vim that could cause data loss when users view specially crafted zip files and press 'x' o...
Mar 13, 2025CVE-2025-25291 is an authentication bypass vulnerability in ruby-saml that allows attackers to bypass SAML single sign-on authentication via signature...
Mar 12, 2025CVE-2024-54085 is a critical authentication bypass vulnerability in AMI's SPx BMC firmware that allows remote attackers to gain unauthorized access th...
Mar 11, 2025This vulnerability in Apache Tomcat allows path traversal attacks via internal dot handling in filenames, potentially leading to remote code execution...
Mar 10, 2025This vulnerability in Vim's tar.vim plugin allows arbitrary shell command execution when opening specially crafted tar archives. Attackers can exploit...
Mar 3, 2025This CVE describes a stack-based buffer overflow vulnerability in libxml2's xmlSnprintfElements function. Attackers can exploit this by providing mali...
Feb 18, 2025This OpenSSH vulnerability allows machine-in-the-middle attacks when VerifyHostKeyDNS is enabled. Attackers can impersonate legitimate servers by expl...
Feb 18, 2025A critical memory corruption vulnerability in GNU Binutils' linker component (ld) allows remote attackers to potentially execute arbitrary code or cau...
Feb 11, 2025A memory corruption vulnerability exists in GNU Binutils' bfd_putl64 function within the ld component. This allows remote attackers to potentially exe...
Feb 11, 2025libcurl incorrectly closes the same eventfd file descriptor twice during threaded name resolution cleanup, causing a use-after-free condition. This vu...
Feb 5, 2025This vulnerability allows attackers to bypass Sparkle's (Ed)DSA signature verification and replace legitimate software updates with malicious payloads...
Feb 4, 2025This vulnerability allows attackers to bypass Windows' Mark-of-the-Web security feature when extracting files with 7-Zip. Attackers can craft maliciou...
Jan 25, 2025This vulnerability in MySQL Server's Optimizer component allows high-privileged attackers with network access to cause denial of service by crashing o...
Jan 21, 2025CVE-2025-22134 is a heap-buffer overflow vulnerability in Vim that occurs when switching buffers using the :all command while visual mode is active. T...
Jan 13, 2025This vulnerability in libxml2 allows attackers to bypass custom SAX handler protections against external entity processing, enabling classic XML Exter...
Dec 23, 2024A Time-of-check Time-of-use (TOCTOU) race condition vulnerability in Apache Tomcat allows attackers to bypass security checks and write malicious file...
Dec 20, 2024CVE-2024-53580 is a NULL pointer dereference vulnerability in iperf v3.17.1 that causes a segmentation fault via the iperf_exchange_parameters() funct...
Dec 18, 2024A Time-of-check Time-of-use (TOCTOU) race condition vulnerability in Apache Tomcat's JSP compilation allows attackers to achieve Remote Code Execution...
Dec 17, 2024This vulnerability allows attackers to cause an integer overflow in PHP's ldap_escape() function on 32-bit systems by providing long string inputs, le...
Nov 22, 2024This vulnerability is a buffer overflow in GLib's SOCKS4 proxy implementation due to an off-by-one error. It allows attackers to execute arbitrary cod...
Nov 11, 2024This vulnerability allows authenticated attackers to cause a Denial of Service (DoS) by crashing StorageGRID services. It affects StorageGRID (formerl...
Nov 8, 2024This vulnerability in Apache Tomcat allows attackers to cause denial of service by exploiting the TLS handshake process to trigger OutOfMemoryError co...
Nov 7, 2024CVE-2024-49761 is a Regular Expression Denial of Service (ReDoS) vulnerability in REXML, Ruby's XML toolkit. It allows attackers to cause denial of se...
Oct 28, 2024This vulnerability in Jetty's DosFilter allows unauthenticated attackers to send crafted requests that trigger OutOfMemory errors, leading to denial-o...
Oct 14, 2024This vulnerability in Apache Commons IO allows attackers to cause denial of service by consuming excessive CPU resources through maliciously crafted i...
Oct 3, 2024This vulnerability in Apache Avro's Java SDK allows attackers to execute arbitrary code by exploiting schema parsing flaws. It affects all users of Ap...
Oct 3, 2024This vulnerability allows attackers to cause a stack overflow by sending malicious Protocol Buffers data with deeply nested groups, potentially crashi...
Sep 19, 2024This AngularJS vulnerability allows attackers to bypass image source restrictions via improper sanitization of the 'srcset' attribute, enabling conten...
Sep 9, 2024CVE-2024-43374 is a use-after-free vulnerability in Vim's argument list handling that can cause the editor to crash. It affects users running Vim vers...
Aug 16, 2024This vulnerability in Oracle Java SE's 2D component allows unauthenticated attackers with network access to potentially modify or read some accessible...
Jul 16, 2024This CVE involves the removal of GLOBALTRUST root certificates from the certifi Python package due to compliance issues. Systems using affected certif...
Jul 5, 2024This vulnerability in Apache Tomcat allows attackers to cause uncontrolled resource consumption through HTTP/2 connections. By sending excessive HTTP ...
Jul 3, 2024This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Apache HTTP Server's mod_rewrite module. Attackers can exploit unsafe Rewrite...
Jul 1, 2024This vulnerability in Apache HTTP Server's mod_proxy module allows attackers to send specially crafted requests with incorrect URL encoding to backend...
Jul 1, 2024A substitution encoding vulnerability in Apache HTTP Server's mod_rewrite module allows attackers to bypass security restrictions and execute scripts ...
Jul 1, 2024Apache HTTP Server 2.4.59 and earlier contain a vulnerability where malicious response headers from backend applications can lead to information discl...
Jul 1, 2024urllib3's CVE-2024-37891 allows the Proxy-Authorization header to leak during cross-origin redirects when configured incorrectly without using urllib3...
Jun 17, 2024This vulnerability in NetApp StorageGRID allows attackers to potentially intercept and decrypt SSH communications through man-in-the-middle attacks. I...
Jun 14, 2024This vulnerability in Intel TDX module software allows a privileged user with local access to potentially escalate privileges due to improper input va...
May 16, 2024Why Monitor Netapp Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 350+ known vulnerabilities affecting Netapp products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Netapp packages in under 60 seconds. No agents required - completely agentless scanning that works across Netapp deployments.
Free vulnerability database: Access detailed information about every Netapp CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Netapp CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions