Max CVSS | 10.0 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2020-8177 | 4.6 |
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
|
27-03-2024 - 16:04 | 14-12-2020 - 20:15 | |
CVE-2017-2628 | 7.5 |
curl, as shipped in Red Hat Enterprise Linux 6 before version 7.19.7-53, did not correctly backport the fix for CVE-2015-3148 because it did not reflect the fact that the HAVE_GSSAPI define was meanwhile substituted by USE_HTTP_NEGOTIATE. This issue
|
12-02-2023 - 23:29 | 12-03-2018 - 15:29 | |
CVE-2019-5482 | 7.5 |
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
|
03-11-2021 - 19:34 | 16-09-2019 - 19:15 | |
CVE-2019-3823 | 5.0 |
libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed n
|
09-03-2021 - 15:15 | 06-02-2019 - 20:29 | |
CVE-2019-5436 | 4.6 |
A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
|
20-10-2020 - 22:15 | 28-05-2019 - 19:29 | |
CVE-2011-2192 | 4.3 |
The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSS
|
27-05-2020 - 20:42 | 07-07-2011 - 21:55 | |
CVE-2018-1000301 | 6.4 |
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP
|
03-10-2019 - 00:03 | 24-05-2018 - 13:29 | |
CVE-2018-16842 | 6.4 |
Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
|
06-08-2019 - 17:15 | 31-10-2018 - 19:29 | |
CVE-2018-14618 | 10.0 |
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocat
|
22-04-2019 - 17:48 | 05-09-2018 - 19:29 | |
CVE-2013-2174 | 6.8 |
Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string endi
|
22-04-2019 - 17:48 | 31-07-2013 - 13:20 | |
CVE-2016-7167 | 7.5 |
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a h
|
13-11-2018 - 11:29 | 07-10-2016 - 14:59 | |
CVE-2016-7141 | 5.0 |
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file
|
13-11-2018 - 11:29 | 03-10-2016 - 21:59 | |
CVE-2017-1000257 | 6.4 |
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. l
|
13-11-2018 - 11:29 | 31-10-2017 - 21:29 | |
CVE-2015-3148 | 5.0 |
cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
|
30-10-2018 - 16:27 | 24-04-2015 - 14:59 | |
CVE-2014-0138 | 6.4 |
The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connec
|
09-10-2018 - 19:36 | 15-04-2014 - 14:55 | |
CVE-2013-1944 | 5.0 |
The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL. Per http://www.ubuntu.com/
|
09-09-2016 - 01:59 | 29-04-2013 - 22:55 |