curl security and bug fix update for downloading files with libcurl librar
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Red Hat Security Advisory: curl security update | 13 Sep 202421:11 | – | osv |
![]() | Red Hat Security Advisory: curl security and bug fix update | 13 Sep 202421:11 | – | osv |
![]() | Low: curl security and bug fix update | 16 May 202300:00 | – | osv |
![]() | Low: curl security update | 9 May 202300:00 | – | osv |
![]() | curl - security update | 28 Jan 202300:00 | – | osv |
![]() | curl-7.85.0-1.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | curl vulnerability | 1 Sep 202221:04 | – | osv |
![]() | Red Hat Security Advisory: curl security update | 13 Sep 202421:18 | – | osv |
![]() | CGA-ppf8-8x2v-3v5v | 6 Jun 202412:26 | – | osv |
![]() | CVE-2022-35252 | 23 Sep 202214:15 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
almalinux | 8 | i686 | libcurl | 7.61.1-30.el8 | libcurl-7.61.1-30.el8.i686.rpm |
almalinux | 8 | i686 | libcurl-devel | 7.61.1-30.el8 | libcurl-devel-7.61.1-30.el8.i686.rpm |
almalinux | 8 | i686 | libcurl-minimal | 7.61.1-30.el8 | libcurl-minimal-7.61.1-30.el8.i686.rpm |
almalinux | 8 | x86_64 | libcurl | 7.61.1-30.el8 | libcurl-7.61.1-30.el8.x86_64.rpm |
almalinux | 8 | x86_64 | libcurl-minimal | 7.61.1-30.el8 | libcurl-minimal-7.61.1-30.el8.x86_64.rpm |
almalinux | 8 | x86_64 | libcurl-devel | 7.61.1-30.el8 | libcurl-devel-7.61.1-30.el8.x86_64.rpm |
almalinux | 8 | x86_64 | curl | 7.61.1-30.el8 | curl-7.61.1-30.el8.x86_64.rpm |
almalinux | 8 | aarch64 | libcurl | 7.61.1-30.el8 | libcurl-7.61.1-30.el8.aarch64.rpm |
almalinux | 8 | aarch64 | curl | 7.61.1-30.el8 | curl-7.61.1-30.el8.aarch64.rpm |
almalinux | 8 | aarch64 | libcurl-minimal | 7.61.1-30.el8 | libcurl-minimal-7.61.1-30.el8.aarch64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo