Lucene search

K
NetappBootstrap Os

7 matches found

CVE
CVE
added 2020/05/09 9:15 p.m.485 views

CVE-2020-12770

An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.

6.7CVSS6.7AI score0.0005EPSS
CVE
CVE
added 2020/05/18 6:15 p.m.376 views

CVE-2020-13143

gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.

6.5CVSS6.5AI score0.01592EPSS
CVE
CVE
added 2022/03/25 7:15 p.m.298 views

CVE-2021-4203

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

6.8CVSS6.8AI score0.0006EPSS
CVE
CVE
added 2024/09/11 10:15 a.m.291 views

CVE-2024-8096

When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than ...

6.5CVSS6.6AI score0.00332EPSS
CVE
CVE
added 2022/07/07 1:15 p.m.267 views

CVE-2022-32206

curl

6.5CVSS7.9AI score0.03169EPSS
CVE
CVE
added 2024/03/27 8:15 a.m.267 views

CVE-2024-2466

libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate che...

6.5CVSS6.4AI score0.00147EPSS
CVE
CVE
added 2024/03/27 8:15 a.m.254 views

CVE-2024-2379

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.

6.3CVSS7.1AI score0.00172EPSS