Lucene search

K

Daniel Stenberg Security Vulnerabilities

cve
cve

CVE-2000-0973

Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.

8.2AI Score

0.029EPSS

2001-01-22 05:00 AM
20
cve
cve

CVE-2002-1868

Dispair 0.1 and 0.2 allows remote attackers to execute arbitrary shell commands via certain form fields.

8.1AI Score

0.123EPSS

2005-06-28 04:00 AM
29
cve
cve

CVE-2005-4077

Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to ...

9.2AI Score

0.001EPSS

2005-12-08 01:03 AM
50
cve
cve

CVE-2006-1061

Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.

7.6AI Score

0.03EPSS

2006-03-21 01:06 AM
29
cve
cve

CVE-2007-3152

c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.

6.3AI Score

0.016EPSS

2007-06-11 10:30 PM
29
cve
cve

CVE-2007-3153

The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.

6.3AI Score

0.007EPSS

2007-06-11 10:30 PM
25