Netapp

H615c Firmware

34 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.08%
  • Published 05.02.2025 10:15:22
  • Last modified 30.07.2025 19:41:45

When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `de...

Exploit
  • EPSS 0.34%
  • Published 11.12.2024 08:15:05
  • Last modified 30.07.2025 17:39:25

When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an e...

  • EPSS 0.07%
  • Published 06.05.2024 20:15:11
  • Last modified 01.08.2025 01:56:26

nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a den...

  • EPSS 0.22%
  • Published 06.05.2024 20:15:11
  • Last modified 18.06.2025 14:50:25

nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in gli...

  • EPSS 0.03%
  • Published 03.04.2024 17:15:51
  • Last modified 17.03.2025 16:05:01

In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix possible use-after-free and null-ptr-deref The pernet operations structure for the subsystem must be registered before registering the generic netlink family.

  • EPSS 0.01%
  • Published 03.04.2024 17:15:51
  • Last modified 17.03.2025 16:02:47

In the Linux kernel, the following vulnerability has been resolved: arp: Prevent overflow in arp_req_get(). syzkaller reported an overflown write in arp_req_get(). [0] When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour entry and c...

Exploit
  • EPSS 0.21%
  • Published 27.03.2024 08:15:41
  • Last modified 30.07.2025 19:42:09

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any ...

Exploit
  • EPSS 1.96%
  • Published 27.03.2024 08:15:41
  • Last modified 30.07.2025 19:42:27

When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all...

  • EPSS 0.02%
  • Published 18.03.2024 11:15:09
  • Last modified 04.04.2025 14:49:01

In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken. Reading frag_off can only be done if we p...

  • EPSS 0.01%
  • Published 06.03.2024 07:15:07
  • Last modified 14.03.2025 18:57:42

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() Return invalid error code -EINVAL for invalid block id. Fixes the below: drivers/gpu/drm/amd/a...