Show filters
148 Total Results
Displaying 91-100 of 148
Sort by:
Attacker Value
Unknown

CVE-2016-8624

Disclosure Date: July 31, 2018 (last updated November 08, 2023)
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
0
Attacker Value
Unknown

CVE-2017-2629

Disclosure Date: July 27, 2018 (last updated November 27, 2024)
curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).
0
Attacker Value
Unknown

CVE-2017-7468

Disclosure Date: July 16, 2018 (last updated November 27, 2024)
In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.
0
Attacker Value
Unknown

CVE-2018-0500

Disclosure Date: July 11, 2018 (last updated November 27, 2024)
Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).
0
Attacker Value
Unknown

CVE-2018-1000301

Disclosure Date: May 24, 2018 (last updated November 26, 2024)
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
0
Attacker Value
Unknown

CVE-2018-1000300

Disclosure Date: May 24, 2018 (last updated November 26, 2024)
curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl < 7.54.1 and curl >= 7.60.0.
0
Attacker Value
Unknown

CVE-2016-9594

Disclosure Date: April 23, 2018 (last updated November 08, 2023)
curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value. Having a weak or virtually non-existent random value makes the operations that use it vulnerable.
0
Attacker Value
Unknown

CVE-2016-9586

Disclosure Date: April 23, 2018 (last updated November 08, 2023)
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
0
Attacker Value
Unknown

CVE-2018-1000120

Disclosure Date: March 14, 2018 (last updated November 26, 2024)
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
0
Attacker Value
Unknown

CVE-2018-1000121

Disclosure Date: March 14, 2018 (last updated November 26, 2024)
A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
0