CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

netapp

snapdrive

15 known vulnerabilities · sorted by CVSS score

CVE-2018-18314
CRITICAL9.8

Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

perl / perl+14
Network
Published Dec 7, 2018
CVE-2018-18312
CRITICAL9.8

Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.

perl / perl+15
Network
Published Dec 5, 2018
CVE-2018-18313
CRITICAL9.1

Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.

perl / perl+16
Network
Published Dec 7, 2018
CVE-2021-3518
HIGH8.8

There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.

xmlsoft / libxml2+20
Network
Published May 18, 2021
CVE-2021-3517
HIGH8.6

There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.

xmlsoft / libxml2+32
Network
Published May 19, 2021
CVE-2019-20388
HIGH7.5

xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.

xmlsoft / libxml2+28
Network
Published Jan 21, 2020
CVE-2018-12015
HIGH7.5

In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.

canonical / ubuntu_linux+13
Network
Published Jun 7, 2018
CVE-2020-7595
HIGH7.5

xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.

netapp / h700s_firmware+32
Network
Published Jan 21, 2020
CVE-2022-23308
HIGH7.5

valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.

xmlsoft / libxml2+48
Network
Published Feb 26, 2022
CVE-2021-3541
MEDIUM6.5

A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.

xmlsoft / libxml2+18
Network
Published Jul 9, 2021
CVE-2022-29824
MEDIUM6.5

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

xmlsoft / libxml2+22
Network
Published May 3, 2022
CVE-2020-24977
MEDIUM6.5

GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.

xmlsoft / libxml2+25
Network
Published Sep 4, 2020
CVE-2018-0735
MEDIUM5.9

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

oracle / secure_global_desktop+45
Network
Published Oct 29, 2018
CVE-2019-1559
MEDIUM5.9

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).

openssl / openssl+168
Network
Published Feb 27, 2019
CVE-2021-3537
MEDIUM5.9

A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.

xmlsoft / libxml2+23
Network
Published May 14, 2021