Show filters
58 Total Results
Displaying 51-58 of 58
Sort by:
Attacker Value
Unknown
CVE-2020-8231
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
0
Attacker Value
Unknown
CVE-2020-8169
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).
0
Attacker Value
Unknown
CVE-2020-8286
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
0
Attacker Value
Unknown
CVE-2020-8285
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
0
Attacker Value
Unknown
CVE-2020-8284
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
0
Attacker Value
Unknown
CVE-2019-20838
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
0
Attacker Value
Unknown
CVE-2020-14155
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
0
Attacker Value
Unknown
CVE-2019-20454
Disclosure Date: February 14, 2020 (last updated February 21, 2025)
An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
0