Netapp

Hci Bootstrap Os

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.32%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 18.06.2025 14:40:48

nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 ...

  • EPSS 0.07%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 01.08.2025 01:56:26

nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...

  • EPSS 0.22%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 18.06.2025 14:50:25

nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...

  • EPSS 0.6%
  • Veröffentlicht 06.05.2024 20:15:11
  • Zuletzt bearbeitet 18.06.2025 14:56:01

nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw...

  • EPSS 0.21%
  • Veröffentlicht 17.03.2023 04:15:14
  • Zuletzt bearbeitet 21.11.2024 07:55:17

ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9.

  • EPSS 0.04%
  • Veröffentlicht 27.07.2022 04:15:10
  • Zuletzt bearbeitet 05.05.2025 16:15:17

An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 02.06.2022 14:15:51
  • Zuletzt bearbeitet 21.11.2024 07:02:11

Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while no...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 02.06.2022 14:15:44
  • Zuletzt bearbeitet 21.11.2024 06:56:10

libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending bus...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 02.06.2022 14:15:44
  • Zuletzt bearbeitet 21.11.2024 06:56:10

The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0....

Exploit
  • EPSS 0.19%
  • Veröffentlicht 02.06.2022 14:15:44
  • Zuletzt bearbeitet 21.11.2024 06:56:10

libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://public...