Show filters
60 Total Results
Displaying 51-60 of 60
Sort by:
Attacker Value
Unknown
CVE-2021-22876
Disclosure Date: April 01, 2021 (last updated February 22, 2025)
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
0
Attacker Value
Unknown
CVE-2020-8177
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
0
Attacker Value
Unknown
CVE-2020-8231
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
0
Attacker Value
Unknown
CVE-2020-8169
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).
0
Attacker Value
Unknown
CVE-2020-8286
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
0
Attacker Value
Unknown
CVE-2020-8285
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
0
Attacker Value
Unknown
CVE-2020-8284
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
0
Attacker Value
Unknown
CVE-2019-20838
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
0
Attacker Value
Unknown
CVE-2020-14155
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
0
Attacker Value
Unknown
CVE-2019-20454
Disclosure Date: February 14, 2020 (last updated February 21, 2025)
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
0