Lucene search

K

4 matches found

CVE
CVE
added 2009/03/05 2:30 a.m.101 views

CVE-2009-0037

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file...

6.8CVSS7.8AI score0.01195EPSS
CVE
CVE
added 2005/10/13 10:2 p.m.78 views

CVE-2005-3185

Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.

7.5CVSS7.7AI score0.04852EPSS
CVE
CVE
added 2012/04/13 8:55 p.m.73 views

CVE-2012-0036

curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack on the (1) IMAP, (2) POP3, or (3) SMTP protocol.

7.5CVSS8.3AI score0.07509EPSS
CVE
CVE
added 2010/10/28 12:0 a.m.41 views

CVE-2010-3842

Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header.

5.8CVSS7AI score0.00898EPSS