CVE-2025-0167
- EPSS 0.08%
- Veröffentlicht 05.02.2025 10:15:22
- Zuletzt bearbeitet 30.07.2025 19:41:45
When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `de...
CVE-2024-11053
- EPSS 0.34%
- Veröffentlicht 11.12.2024 08:15:05
- Zuletzt bearbeitet 30.07.2025 17:39:25
When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an e...
CVE-2024-6119
- EPSS 4.4%
- Veröffentlicht 03.09.2024 16:15:07
- Zuletzt bearbeitet 03.06.2025 10:51:54
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...
CVE-2024-33601
- EPSS 0.07%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 01.08.2025 01:56:26
nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...
CVE-2024-33600
- EPSS 0.22%
- Veröffentlicht 06.05.2024 20:15:11
- Zuletzt bearbeitet 18.06.2025 14:50:25
nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...
CVE-2024-26735
- EPSS 0.03%
- Veröffentlicht 03.04.2024 17:15:51
- Zuletzt bearbeitet 17.03.2025 16:05:01
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.
CVE-2024-26733
- EPSS 0.01%
- Veröffentlicht 03.04.2024 17:15:51
- Zuletzt bearbeitet 17.03.2025 16:02:47
In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in arp_req_get(). [0] When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour entry and c...
CVE-2024-2379
- EPSS 0.21%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:09
libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any ...
CVE-2024-2398
- EPSS 1.96%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:27
When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all...
CVE-2024-26633
- EPSS 0.02%
- Veröffentlicht 18.03.2024 11:15:09
- Zuletzt bearbeitet 04.04.2025 14:49:01
In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken. Reading frag_off can only be done if we p...