Количество 16
Количество 16

CVE-2021-22898
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVE-2021-22898
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVE-2021-22898
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVE-2021-22898
CVE-2021-22898
curl 7.7 through 7.76.1 suffers from an information disclosure when th ...

openSUSE-SU-2021:1762-1
Security update for curl

openSUSE-SU-2021:0808-1
Security update for curl

SUSE-SU-2021:1763-1
Security update for curl

SUSE-SU-2021:1762-1
Security update for curl

SUSE-SU-2021:14760-1
Security update for curl

SUSE-SU-2021:14735-1
Security update for curl
GHSA-7w8r-q58w-5wcr
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

BDU:2021-03580
Уязвимость функции sscanf() библиотеки libcurl программного средства для взаимодействия с серверами CURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

SUSE-SU-2021:1809-1
Security update for curl
ELSA-2021-4511
ELSA-2021-4511: curl security and bug fix update (MODERATE)

SUSE-SU-2021:1786-1
Security update for curl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-22898 curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. | CVSS3: 3.1 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-22898 curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. | CVSS3: 3.1 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-22898 curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. | CVSS3: 3.1 | 0% Низкий | около 4 лет назад |
![]() | CVSS3: 3.1 | 0% Низкий | почти 4 года назад | |
CVE-2021-22898 curl 7.7 through 7.76.1 suffers from an information disclosure when th ... | CVSS3: 3.1 | 0% Низкий | около 4 лет назад | |
![]() | openSUSE-SU-2021:1762-1 Security update for curl | 0% Низкий | почти 4 года назад | |
![]() | openSUSE-SU-2021:0808-1 Security update for curl | 0% Низкий | около 4 лет назад | |
![]() | SUSE-SU-2021:1763-1 Security update for curl | 0% Низкий | около 4 лет назад | |
![]() | SUSE-SU-2021:1762-1 Security update for curl | 0% Низкий | около 4 лет назад | |
![]() | SUSE-SU-2021:14760-1 Security update for curl | 0% Низкий | почти 4 года назад | |
![]() | SUSE-SU-2021:14735-1 Security update for curl | 0% Низкий | около 4 лет назад | |
GHSA-7w8r-q58w-5wcr curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. | CVSS3: 3.1 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2021-03580 Уязвимость функции sscanf() библиотеки libcurl программного средства для взаимодействия с серверами CURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 3.1 | 0% Низкий | около 4 лет назад |
![]() | SUSE-SU-2021:1809-1 Security update for curl | около 4 лет назад | ||
ELSA-2021-4511 ELSA-2021-4511: curl security and bug fix update (MODERATE) | больше 3 лет назад | |||
![]() | SUSE-SU-2021:1786-1 Security update for curl | около 4 лет назад |
Уязвимостей на страницу