Max CVSS | 10.0 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2018-1312 | 6.8 |
In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication con
|
07-09-2022 - 17:45 | 26-03-2018 - 15:29 | |
CVE-2018-1000007 | 5.0 |
libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow r
|
13-06-2022 - 19:10 | 24-01-2018 - 22:29 | |
CVE-2016-9586 | 6.8 |
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary
|
29-06-2021 - 15:15 | 23-04-2018 - 18:29 | |
CVE-2016-8623 | 5.0 |
A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
|
29-06-2021 - 15:15 | 01-08-2018 - 06:29 | |
CVE-2016-8624 | 5.0 |
curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for
|
29-06-2021 - 15:15 | 31-07-2018 - 21:29 | |
CVE-2016-8625 | 5.0 |
curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.
|
29-06-2021 - 15:15 | 01-08-2018 - 06:29 | |
CVE-2016-8615 | 5.0 |
A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
|
29-06-2021 - 15:15 | 01-08-2018 - 06:29 | |
CVE-2016-8617 | 4.4 |
The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
|
29-06-2021 - 15:15 | 31-07-2018 - 22:29 | |
CVE-2017-1000254 | 5.0 |
libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with
|
29-06-2021 - 15:15 | 06-10-2017 - 13:29 | |
CVE-2018-1333 | 5.0 |
By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. Fixed in Apache HTTP Server 2.4.34 (Affected 2.4.18-2.4.30,2.4.33).
|
06-06-2021 - 11:15 | 18-06-2018 - 18:29 | |
CVE-2018-1301 | 4.3 |
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to tri
|
06-06-2021 - 11:15 | 26-03-2018 - 15:29 | |
CVE-2018-1283 | 3.5 |
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION
|
06-06-2021 - 11:15 | 26-03-2018 - 15:29 | |
CVE-2018-1303 | 5.0 |
A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of
|
06-06-2021 - 11:15 | 26-03-2018 - 15:29 | |
CVE-2017-15710 | 5.0 |
In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If th
|
06-06-2021 - 11:15 | 26-03-2018 - 15:29 | |
CVE-2018-11763 | 4.3 |
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitiga
|
06-06-2021 - 11:15 | 25-09-2018 - 21:29 | |
CVE-2017-15715 | 6.8 |
In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some
|
06-06-2021 - 11:15 | 26-03-2018 - 15:29 | |
CVE-2016-5421 | 6.8 |
Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
|
08-05-2020 - 17:43 | 10-08-2016 - 14:59 | |
CVE-2016-8616 | 4.3 |
A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for
|
09-10-2019 - 23:20 | 01-08-2018 - 06:29 | |
CVE-2016-8619 | 7.5 |
The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
|
09-10-2019 - 23:20 | 01-08-2018 - 06:29 | |
CVE-2016-8620 | 7.5 |
The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
|
09-10-2019 - 23:20 | 01-08-2018 - 06:29 | |
CVE-2017-7407 | 2.1 |
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argum
|
03-10-2019 - 00:03 | 03-04-2017 - 20:59 | |
CVE-2018-1000301 | 6.4 |
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP
|
03-10-2019 - 00:03 | 24-05-2018 - 13:29 | |
CVE-2018-1000122 | 6.4 |
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
|
03-10-2019 - 00:03 | 14-03-2018 - 18:29 | |
CVE-2018-1000121 | 5.0 |
A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
|
23-07-2019 - 23:15 | 14-03-2018 - 18:29 | |
CVE-2018-1000120 | 7.5 |
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
|
18-06-2019 - 22:15 | 14-03-2018 - 18:29 | |
CVE-2018-14618 | 10.0 |
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocat
|
22-04-2019 - 17:48 | 05-09-2018 - 19:29 | |
CVE-2017-8817 | 7.5 |
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
|
13-11-2018 - 11:29 | 29-11-2017 - 18:29 | |
CVE-2017-8816 | 7.5 |
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via
|
13-11-2018 - 11:29 | 29-11-2017 - 18:29 | |
CVE-2016-5419 | 5.0 |
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
|
13-11-2018 - 11:29 | 10-08-2016 - 14:59 | |
CVE-2016-8618 | 7.5 |
The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
|
13-11-2018 - 11:29 | 31-07-2018 - 21:29 | |
CVE-2016-8621 | 5.0 |
The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
|
13-11-2018 - 11:29 | 31-07-2018 - 22:29 | |
CVE-2016-7167 | 7.5 |
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a h
|
13-11-2018 - 11:29 | 07-10-2016 - 14:59 | |
CVE-2016-5420 | 5.0 |
curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a diffe
|
13-11-2018 - 11:29 | 10-08-2016 - 14:59 | |
CVE-2016-8622 | 7.5 |
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32
|
13-11-2018 - 11:29 | 31-07-2018 - 21:29 | |
CVE-2016-7141 | 5.0 |
curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file
|
13-11-2018 - 11:29 | 03-10-2016 - 21:59 | |
CVE-2017-1000101 | 4.3 |
curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl rea
|
13-11-2018 - 11:29 | 05-10-2017 - 01:29 | |
CVE-2017-1000257 | 6.4 |
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. l
|
13-11-2018 - 11:29 | 31-10-2017 - 21:29 | |
CVE-2017-1000100 | 4.3 |
When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untr
|
13-11-2018 - 11:29 | 05-10-2017 - 01:29 |