Netapp

Solidfire Baseboard Management Controller Firmware

70 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 11.10.2021 19:15:07
  • Last modified 21.11.2024 06:27:27

An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute pr...

Exploit
  • EPSS 0.93%
  • Published 05.10.2021 00:15:07
  • Last modified 21.11.2024 06:27:03

The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.

  • EPSS 0.03%
  • Published 02.10.2021 00:15:07
  • Last modified 21.11.2024 06:26:55

prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.

Exploit
  • EPSS 0.19%
  • Published 29.09.2021 20:15:08
  • Last modified 21.11.2024 05:50:59

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not ...

Exploit
  • EPSS 0.07%
  • Published 29.09.2021 20:15:08
  • Last modified 21.11.2024 05:50:59

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This ...

Exploit
  • EPSS 0.35%
  • Published 23.09.2021 13:15:08
  • Last modified 09.06.2025 15:15:25

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

Exploit
  • EPSS 0.75%
  • Published 05.08.2021 21:15:11
  • Last modified 09.06.2025 15:15:24

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the invo...

  • EPSS 0.09%
  • Published 09.07.2021 11:15:09
  • Last modified 21.11.2024 06:21:58

An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privi...

Exploit
  • EPSS 0.34%
  • Published 11.06.2021 16:15:11
  • Last modified 21.11.2024 05:50:52

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentia...

Exploit
  • EPSS 1.08%
  • Published 11.06.2021 16:15:10
  • Last modified 21.11.2024 05:50:51

curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" ...