Логотип exploitDog
product: "mysql_server"
Консоль
Логотип exploitDog

exploitDog

product: "mysql_server"

Количество 1 162

Количество 1 162

ubuntu логотип

CVE-2019-5443

около 6 лет назад

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2019-5443

около 6 лет назад

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

CVSS3: 8.4
EPSS: Низкий
nvd логотип

CVE-2019-5443

около 6 лет назад

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2019-5443

около 6 лет назад

A non-privileged user or program can put code and a config file in a k ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1762-1

около 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0808-1

около 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2062-1

больше 4 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2037-1

больше 4 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1763-1

около 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:1762-1

около 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14760-1

около 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14735-1

около 4 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3379-1

больше 4 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3377-1

больше 4 лет назад

Security update for krb5

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3375-1

больше 4 лет назад

Security update for krb5

EPSS: Низкий
rocky логотип

RLSA-2021:4511

больше 3 лет назад

Moderate: curl security and bug fix update

EPSS: Низкий
github логотип

GHSA-rjqf-6h27-xqfp

около 3 лет назад

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-qhhj-q26m-mrw8

около 3 лет назад

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-7w8r-q58w-5wcr

около 3 лет назад

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVSS3: 3.1
EPSS: Низкий
github логотип

GHSA-39wv-qjgj-4jxg

больше 3 лет назад

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-5443

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-5443

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

CVSS3: 8.4
1%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-5443

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.

CVSS3: 7.8
1%
Низкий
около 6 лет назад
debian логотип
CVE-2019-5443

A non-privileged user or program can put code and a config file in a k ...

CVSS3: 7.8
1%
Низкий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1762-1

Security update for curl

0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0808-1

Security update for curl

0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2062-1

Security update for krb5

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2037-1

Security update for krb5

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1763-1

Security update for curl

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:1762-1

Security update for curl

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14760-1

Security update for curl

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14735-1

Security update for curl

0%
Низкий
около 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3379-1

Security update for krb5

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3377-1

Security update for krb5

0%
Низкий
больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3375-1

Security update for krb5

0%
Низкий
больше 4 лет назад
rocky логотип
RLSA-2021:4511

Moderate: curl security and bug fix update

0%
Низкий
больше 3 лет назад
github логотип
GHSA-rjqf-6h27-xqfp

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CVSS3: 5.3
0%
Низкий
около 3 лет назад
github логотип
GHSA-qhhj-q26m-mrw8

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.

CVSS3: 3.7
1%
Низкий
около 3 лет назад
github логотип
GHSA-7w8r-q58w-5wcr

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVSS3: 3.1
0%
Низкий
около 3 лет назад
github логотип
GHSA-39wv-qjgj-4jxg

Due to the formatting logic of the "console.table()" function it was not safe to allow user controlled input to be passed to the "properties" parameter while simultaneously passing a plain object with at least one property as the first parameter, which could be "__proto__". The prototype pollution has very limited control, in that it only allows an empty string to be assigned to numerical keys of the object prototype.Node.js >= 12.22.9, >= 14.18.3, >= 16.13.2, and >= 17.3.1 use a null protoype for the object these properties are being assigned to.

CVSS3: 8.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу