CVE-2024-54085
- EPSS 21.09%
- Published 11.03.2025 14:00:58
- Last modified 27.06.2025 16:57:49
AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availabili...
CVE-2025-0167
- EPSS 0.08%
- Published 05.02.2025 10:15:22
- Last modified 30.07.2025 19:41:45
When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `de...
CVE-2025-0665
- EPSS 5.13%
- Published 05.02.2025 10:15:22
- Last modified 30.07.2025 19:41:22
libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.
CVE-2024-6119
- EPSS 4.4%
- Published 03.09.2024 16:15:07
- Last modified 03.06.2025 10:51:54
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...
CVE-2024-36958
- EPSS 0.05%
- Published 30.05.2024 16:15:18
- Last modified 01.10.2025 14:07:31
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix nfsd4_encode_fattr4() crasher Ensure that args.acl is initialized early. It is used in an unconditional call to kfree() on the way out of nfsd4_encode_fattr4().
CVE-2024-33599
- EPSS 0.6%
- Published 06.05.2024 20:15:11
- Last modified 18.06.2025 14:56:01
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw...
CVE-2024-33600
- EPSS 0.22%
- Published 06.05.2024 20:15:11
- Last modified 18.06.2025 14:50:25
nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...
CVE-2024-33601
- EPSS 0.07%
- Published 06.05.2024 20:15:11
- Last modified 01.08.2025 01:56:26
nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...
CVE-2024-33602
- EPSS 0.32%
- Published 06.05.2024 20:15:11
- Last modified 18.06.2025 14:40:48
nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 ...
CVE-2024-28757
- EPSS 0.64%
- Published 10.03.2024 05:15:06
- Last modified 28.03.2025 19:15:21
libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).