Search CVE reports


Toggle filters

81 – 90 of 168 results


CVE-2019-5443

Medium priority
Not affected

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is...

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Not affected
Show less packages

CVE-2019-5436

Medium priority
Fixed

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Fixed
Show less packages

CVE-2019-5435

Medium priority
Fixed

An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Not affected
Show less packages

CVE-2019-3823

Low priority
Fixed

libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character...

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Fixed Fixed
Show less packages

CVE-2019-3822

Medium priority
Fixed

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request...

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Fixed
Show less packages

CVE-2019-15601

Medium priority
Not affected

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Not affected
Show less packages

CVE-2018-16890

Medium priority
Fixed

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data...

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Fixed
Show less packages

CVE-2018-16842

Medium priority
Fixed

Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Fixed
Show less packages

CVE-2018-16840

Medium priority
Fixed

A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first...

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Not affected
Show less packages

CVE-2018-16839

Medium priority
Fixed

Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.

1 affected package

curl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
curl Fixed
Show less packages