ID CVE-2015-3148
Summary cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
References
Vulnerable Configurations
  • cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
  • cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
    cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:-:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:-:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.0.1.104:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.0.2.106:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.0-103:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.0-103\(a\):*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.0-103\(a\):*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.0-109:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.0-118:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.0.121:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.2-127:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.2.127:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.3.132:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.4-143:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.4.143:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.5-146:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.5.146:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.5.146:b:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.6-156:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.6.156:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.7-168:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.7.168:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.8:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.8-177:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.8.179:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.9:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.9-178:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.10:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.10-186:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.10.186:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.10.186:b:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.10.186:c:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.11:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.11-197:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.11.197:a:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.12-118:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.12-200:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.12.201:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.14:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.14:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.14.20:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.15:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.15:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.15-210:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.1.15.210:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.0-68:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.0.64:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.1-73:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.1.73:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.2-77:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.2.77:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.0.2.77:b:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:3.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:3.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.0.0-95:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.0.0.96:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.1.0-103:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.1.0.102:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.1.0.102:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:6.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:6.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:7.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:7.2:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:7.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:system_management_homepage:7.5.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:hp:system_management_homepage:7.5.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
    cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 30-10-2018 - 16:27)
Impact:
Exploitability:
CWE CWE-284
CAPEC
  • Embedding Scripts within Scripts
    An attack of this type exploits a programs' vulnerabilities that are brought on by allowing remote hosts to execute scripts. The attacker leverages this capability to execute scripts to execute his/her own script by embedding it within other scripts that the target software is likely to execute. The attacker must have the ability to inject script into script that is likely to be executed. If this is done, then the attacker can potentially launch a variety of probes and attacks against the web server's local environment, in many cases the so-called DMZ, back end resources the web server can communicate with, and other hosts. With the proliferation of intermediaries, such as Web App Firewalls, network devices, and even printers having JVMs and Web servers, there are many locales where an attacker can inject malicious scripts. Since this attack pattern defines scripts within scripts, there are likely privileges to execute said attack on the host. Of course, these attacks are not solely limited to the server side, client side scripts like Ajax and client side JavaScript can contain malicious scripts as well. In general all that is required is for there to be sufficient privileges to execute a script, but not protected against writing.
  • Signature Spoofing by Key Theft
    An attacker obtains an authoritative or reputable signer's private signature key by theft and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
redhat via4
advisories
  • bugzilla
    id 1213351
    title CVE-2015-3148 curl: Negotiate not treated as connection-oriented
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment curl is earlier than 0:7.19.7-46.el6
          oval oval:com.redhat.rhsa:tst:20151254007
        • comment curl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918016
      • AND
        • comment libcurl is earlier than 0:7.19.7-46.el6
          oval oval:com.redhat.rhsa:tst:20151254009
        • comment libcurl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918020
      • AND
        • comment libcurl-devel is earlier than 0:7.19.7-46.el6
          oval oval:com.redhat.rhsa:tst:20151254005
        • comment libcurl-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918018
    rhsa
    id RHSA-2015:1254
    released 2015-07-22
    severity Moderate
    title RHSA-2015:1254: curl security, bug fix, and enhancement update (Moderate)
  • bugzilla
    id 1218272
    title Performance problem with libcurl and FTP on RHEL7.X
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 7 Client is installed
        oval oval:com.redhat.rhba:tst:20150364001
      • comment Red Hat Enterprise Linux 7 Server is installed
        oval oval:com.redhat.rhba:tst:20150364002
      • comment Red Hat Enterprise Linux 7 Workstation is installed
        oval oval:com.redhat.rhba:tst:20150364003
      • comment Red Hat Enterprise Linux 7 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20150364004
    • OR
      • AND
        • comment curl is earlier than 0:7.29.0-25.el7
          oval oval:com.redhat.rhsa:tst:20152159009
        • comment curl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918016
      • AND
        • comment libcurl is earlier than 0:7.29.0-25.el7
          oval oval:com.redhat.rhsa:tst:20152159007
        • comment libcurl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918020
      • AND
        • comment libcurl-devel is earlier than 0:7.29.0-25.el7
          oval oval:com.redhat.rhsa:tst:20152159005
        • comment libcurl-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20110918018
    rhsa
    id RHSA-2015:2159
    released 2015-11-19
    severity Moderate
    title RHSA-2015:2159: curl security, bug fix, and enhancement update (Moderate)
rpms
  • curl-0:7.19.7-46.el6
  • libcurl-0:7.19.7-46.el6
  • libcurl-devel-0:7.19.7-46.el6
  • curl-0:7.29.0-25.el7
  • libcurl-0:7.29.0-25.el7
  • libcurl-devel-0:7.29.0-25.el7
refmap via4
apple APPLE-SA-2015-08-13-2
bid 74301
confirm
debian DSA-3232
fedora
  • FEDORA-2015-6695
  • FEDORA-2015-6712
  • FEDORA-2015-6728
  • FEDORA-2015-6853
  • FEDORA-2015-6864
gentoo GLSA-201509-02
hp HPSBHF03544
mandriva
  • MDVSA-2015:219
  • MDVSA-2015:220
sectrack 1032232
suse openSUSE-SU-2015:0799
ubuntu USN-2591-1
Last major update 30-10-2018 - 16:27
Published 24-04-2015 - 14:59
Back to Top