Vulnerabilities
Vulnerable Software
Redhat:  >> Gluster Storage  >> 2.0  Security Vulnerabilities
The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.
CVSS Score
5.4
EPSS Score
0.022
Published
2018-10-31
Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticate as the target user.
CVSS Score
4.2
EPSS Score
0.006
Published
2018-09-11
Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.
CVSS Score
8.8
EPSS Score
0.047
Published
2012-03-22


Contact Us

Shodan ® - All rights reserved