Netapp

Solidfire & Hci Management Node

83 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 3.39%
  • Veröffentlicht 01.11.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 08:41:14

A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free prob...

  • EPSS 0.07%
  • Veröffentlicht 18.07.2023 00:15:09
  • Zuletzt bearbeitet 21.11.2024 08:13:33

An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to a...

  • EPSS 0.06%
  • Veröffentlicht 18.07.2023 00:15:09
  • Zuletzt bearbeitet 21.11.2024 08:13:32

An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.

  • EPSS 0.04%
  • Veröffentlicht 18.07.2023 00:15:09
  • Zuletzt bearbeitet 21.11.2024 08:13:32

An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.

  • EPSS 0.03%
  • Veröffentlicht 24.04.2023 23:15:18
  • Zuletzt bearbeitet 21.11.2024 07:57:45

The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges a...

  • EPSS 0.17%
  • Veröffentlicht 24.08.2022 16:15:09
  • Zuletzt bearbeitet 21.11.2024 06:37:09

A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 02.06.2022 14:15:51
  • Zuletzt bearbeitet 21.11.2024 07:02:11

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while no...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 02.06.2022 14:15:44
  • Zuletzt bearbeitet 21.11.2024 06:56:10

libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending bus...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 02.06.2022 14:15:44
  • Zuletzt bearbeitet 21.11.2024 06:56:10

The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0....

Exploit
  • EPSS 0.19%
  • Veröffentlicht 02.06.2022 14:15:44
  • Zuletzt bearbeitet 21.11.2024 06:56:10

libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://public...