CVE-2024-54085
- EPSS 21.09%
- Veröffentlicht 11.03.2025 14:00:58
- Zuletzt bearbeitet 27.06.2025 16:57:49
AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availabili...
CVE-2025-0167
- EPSS 0.08%
- Veröffentlicht 05.02.2025 10:15:22
- Zuletzt bearbeitet 30.07.2025 19:41:45
When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `de...
CVE-2025-0665
- EPSS 5.13%
- Veröffentlicht 05.02.2025 10:15:22
- Zuletzt bearbeitet 30.07.2025 19:41:22
libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.
CVE-2024-11053
- EPSS 0.34%
- Veröffentlicht 11.12.2024 08:15:05
- Zuletzt bearbeitet 30.07.2025 17:39:25
When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an e...
CVE-2024-8096
- EPSS 0.21%
- Veröffentlicht 11.09.2024 10:15:02
- Zuletzt bearbeitet 30.07.2025 19:42:16
When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. ...
CVE-2024-6119
- EPSS 4.4%
- Veröffentlicht 03.09.2024 16:15:07
- Zuletzt bearbeitet 03.06.2025 10:51:54
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...
CVE-2024-36958
- EPSS 0.05%
- Veröffentlicht 30.05.2024 16:15:18
- Zuletzt bearbeitet 01.10.2025 14:07:31
In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix nfsd4_encode_fattr4() crasher Ensure that args.acl is initialized early. It is used in an unconditional call to kfree() on the way out of nfsd4_encode_fattr4().
CVE-2024-33599
- EPSS 0.6%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 18.06.2025 14:56:01
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw...
CVE-2024-33600
- EPSS 0.22%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 18.06.2025 14:50:25
nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...
CVE-2024-33601
- EPSS 0.07%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 01.08.2025 01:56:26
nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...