Max CVSS | 7.5 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2016-0718 | 7.5 |
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
|
12-02-2023 - 23:15 | 26-05-2016 - 16:59 | |
CVE-2017-6004 | 5.0 |
The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a craft
|
29-06-2021 - 15:15 | 16-02-2017 - 11:59 | |
CVE-2016-8623 | 5.0 |
A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
|
29-06-2021 - 15:15 | 01-08-2018 - 06:29 | |
CVE-2016-8624 | 5.0 |
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for
|
29-06-2021 - 15:15 | 31-07-2018 - 21:29 | |
CVE-2016-8625 | 5.0 |
curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.
|
29-06-2021 - 15:15 | 01-08-2018 - 06:29 | |
CVE-2016-8615 | 5.0 |
A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
|
29-06-2021 - 15:15 | 01-08-2018 - 06:29 | |
CVE-2016-8617 | 4.4 |
The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
|
29-06-2021 - 15:15 | 31-07-2018 - 22:29 | |
CVE-2017-1000254 | 5.0 |
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with
|
29-06-2021 - 15:15 | 06-10-2017 - 13:29 | |
CVE-2016-9598 | 4.3 |
libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2
|
16-11-2020 - 20:26 | 16-08-2018 - 20:29 | |
CVE-2018-0500 | 7.5 |
Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nons
|
24-08-2020 - 17:37 | 11-07-2018 - 13:29 | |
CVE-2016-8616 | 4.3 |
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for
|
09-10-2019 - 23:20 | 01-08-2018 - 06:29 | |
CVE-2016-8619 | 7.5 |
The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
|
09-10-2019 - 23:20 | 01-08-2018 - 06:29 | |
CVE-2016-8618 | 7.5 |
The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
|
13-11-2018 - 11:29 | 31-07-2018 - 21:29 | |
CVE-2016-8621 | 5.0 |
The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
|
13-11-2018 - 11:29 | 31-07-2018 - 22:29 | |
CVE-2016-7167 | 7.5 |
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a h
|
13-11-2018 - 11:29 | 07-10-2016 - 14:59 | |
CVE-2016-8622 | 7.5 |
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32
|
13-11-2018 - 11:29 | 31-07-2018 - 21:29 | |
CVE-2017-1000257 | 6.4 |
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. l
|
13-11-2018 - 11:29 | 31-10-2017 - 21:29 | |
CVE-2017-7245 | 6.8 |
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
|
17-08-2018 - 10:29 | 23-03-2017 - 21:59 | |
CVE-2017-7186 | 5.0 |
libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.
|
17-08-2018 - 10:29 | 20-03-2017 - 00:59 | |
CVE-2017-7244 | 4.3 |
The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.
|
17-08-2018 - 10:29 | 23-03-2017 - 21:59 | |
CVE-2017-7246 | 6.8 |
Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
|
17-08-2018 - 10:29 | 23-03-2017 - 21:59 |