Show filters
28 Total Results
Displaying 11-20 of 28
Sort by:
Attacker Value
Unknown

CVE-2021-30134

Disclosure Date: December 26, 2022 (last updated October 08, 2023)
php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the post_file_path_upload.php key parameter and the POST data to post_multidimensional.php.
Attacker Value
Unknown

CVE-2020-28425

Disclosure Date: August 02, 2022 (last updated October 08, 2023)
This affects all versions of package curljs.
Attacker Value
Unknown

CVE-2020-36474

Disclosure Date: August 20, 2021 (last updated November 29, 2024)
SafeCurl before 0.9.2 has a DNS rebinding vulnerability.
Attacker Value
Unknown

CVE-2021-23416

Disclosure Date: July 28, 2021 (last updated November 28, 2024)
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
Attacker Value
Unknown

CVE-2020-7646

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
curlrequest through 1.0.1 allows reading any file by populating the file parameter with user input.
Attacker Value
Unknown

CVE-2019-10789

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
All versions of curling.js are vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
Attacker Value
Unknown

CVE-2018-6651

Disclosure Date: February 05, 2018 (last updated November 26, 2024)
In the uncurl_ws_accept function in uncurl.c in uncurl before 0.07, as used in Parsec before 140-3, insufficient Origin header validation (accepting an arbitrary substring match) for WebSocket API requests allows remote attackers to bypass intended access restrictions. In Parsec, this means full control over the victim's computer.
0
Attacker Value
Unknown

CVE-2017-0906

Disclosure Date: November 13, 2017 (last updated November 26, 2024)
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources.
0
Attacker Value
Unknown

CVE-2017-0905

Disclosure Date: November 13, 2017 (last updated November 26, 2024)
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
0
Attacker Value
Unknown

CVE-2017-0907

Disclosure Date: November 13, 2017 (last updated November 26, 2024)
The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
0