curl |
CVE-2018-0500 |
严重 |
7.57.0-r0 |
7.61.0-r0 |
curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0500
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-07-11 13:29 修改: 2020-08-24 17:37
|
curl |
CVE-2018-1000005 |
严重 |
7.57.0-r0 |
7.58.0-r0 |
curl: Out-of-bounds read in code handling HTTP/2 trailers
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000005
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-01-24 22:29 修改: 2019-06-18 22:15
|
curl |
CVE-2018-1000120 |
严重 |
7.57.0-r0 |
7.59.0-r0 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
curl |
CVE-2018-1000122 |
严重 |
7.57.0-r0 |
7.59.0-r0 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-1000300 |
严重 |
7.57.0-r0 |
7.60.0-r0 |
curl: FTP shutdown response heap-based buffer overflow can potentially lead to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000300
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-05-24 13:29 修改: 2020-08-24 17:37
|
curl |
CVE-2018-1000301 |
严重 |
7.57.0-r0 |
7.60.0-r0 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
curl |
CVE-2018-14618 |
严重 |
7.57.0-r0 |
7.61.1-r0 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
curl |
CVE-2018-16839 |
严重 |
7.57.0-r0 |
7.61.1-r1 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
curl |
CVE-2018-16840 |
严重 |
7.57.0-r0 |
7.61.1-r1 |
curl: Use-after-free when closing "easy" handle in Curl_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16840
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-10-31 18:29 修改: 2019-10-09 23:36
|
curl |
CVE-2018-16842 |
严重 |
7.57.0-r0 |
7.61.1-r1 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
curl |
CVE-2019-3822 |
严重 |
7.57.0-r0 |
7.61.1-r2 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
libcurl |
CVE-2018-0500 |
严重 |
7.57.0-r0 |
7.61.0-r0 |
curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-0500
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-07-11 13:29 修改: 2020-08-24 17:37
|
libcurl |
CVE-2018-1000005 |
严重 |
7.57.0-r0 |
7.58.0-r0 |
curl: Out-of-bounds read in code handling HTTP/2 trailers
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000005
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-01-24 22:29 修改: 2019-06-18 22:15
|
libcurl |
CVE-2018-1000120 |
严重 |
7.57.0-r0 |
7.59.0-r0 |
curl: FTP path trickery leads to NIL byte out of bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000120
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-03-14 18:29 修改: 2019-06-18 22:15
|
libcurl |
CVE-2018-1000122 |
严重 |
7.57.0-r0 |
7.59.0-r0 |
curl: RTSP RTP buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000122
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-03-14 18:29 修改: 2019-10-03 00:03
|
libcurl |
CVE-2018-1000300 |
严重 |
7.57.0-r0 |
7.60.0-r0 |
curl: FTP shutdown response heap-based buffer overflow can potentially lead to RCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000300
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-05-24 13:29 修改: 2020-08-24 17:37
|
libcurl |
CVE-2018-1000301 |
严重 |
7.57.0-r0 |
7.60.0-r0 |
curl: Out-of-bounds heap read when missing RTSP headers allows information leak or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000301
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-05-24 13:29 修改: 2019-10-03 00:03
|
libcurl |
CVE-2018-14618 |
严重 |
7.57.0-r0 |
7.61.1-r0 |
curl: NTLM password overflow via integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-14618
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-09-05 19:29 修改: 2019-04-22 17:48
|
libcurl |
CVE-2018-16839 |
严重 |
7.57.0-r0 |
7.61.1-r1 |
curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16839
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-10-31 18:29 修改: 2023-11-07 02:53
|
libcurl |
CVE-2018-16840 |
严重 |
7.57.0-r0 |
7.61.1-r1 |
curl: Use-after-free when closing "easy" handle in Curl_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16840
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-10-31 18:29 修改: 2019-10-09 23:36
|
libcurl |
CVE-2018-16842 |
严重 |
7.57.0-r0 |
7.61.1-r1 |
curl: Heap-based buffer over-read in the curl tool warning formatting
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16842
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-10-31 19:29 修改: 2019-08-06 17:15
|
libcurl |
CVE-2019-3822 |
严重 |
7.57.0-r0 |
7.61.1-r2 |
curl: NTLMv2 type-3 header stack buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3822
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
curl |
CVE-2019-3823 |
高危 |
7.57.0-r0 |
7.61.1-r2 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|
curl |
CVE-2018-1000121 |
高危 |
7.57.0-r0 |
7.59.0-r0 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
curl |
CVE-2018-16890 |
高危 |
7.57.0-r0 |
7.61.1-r2 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
libcurl |
CVE-2018-1000121 |
高危 |
7.57.0-r0 |
7.59.0-r0 |
curl: LDAP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1000121
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2018-03-14 18:29 修改: 2019-07-23 23:15
|
libcurl |
CVE-2018-16890 |
高危 |
7.57.0-r0 |
7.61.1-r2 |
curl: NTLM type-2 heap out-of-bounds buffer read
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-16890
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2019-02-06 20:29 修改: 2023-11-07 02:53
|
libcurl |
CVE-2019-3823 |
高危 |
7.57.0-r0 |
7.61.1-r2 |
curl: SMTP end-of-response out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-3823
镜像层: sha256:ca6d4aa50743b6a636f2d6fae39b16040f9fa66f952f76bf6b3b9def1e570b23
发布日期: 2019-02-06 20:29 修改: 2023-11-07 03:10
|