Количество 8
Количество 8

BDU:2022-03184
Уязвимость утилиты командной строки cURL, связанная с ошибками кодирования URL-адресов, позволяющая нарушителю перенаправить пользователя на другой URL-адрес

ROS-20220524-03
Множественные уязвимости cURL

CVE-2022-27780
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.

CVE-2022-27780
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.

CVE-2022-27780
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.

CVE-2022-27780
CVE-2022-27780
The curl URL parser wrongly accepts percent-encoded URL separators lik ...
GHSA-82rv-h33p-2xgc
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2022-03184 Уязвимость утилиты командной строки cURL, связанная с ошибками кодирования URL-адресов, позволяющая нарушителю перенаправить пользователя на другой URL-адрес | CVSS3: 5.3 | 0% Низкий | около 3 лет назад |
![]() | ROS-20220524-03 Множественные уязвимости cURL | около 3 лет назад | ||
![]() | CVE-2022-27780 The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more. | CVSS3: 7.5 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-27780 The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more. | CVSS3: 7.5 | 0% Низкий | около 3 лет назад |
![]() | CVE-2022-27780 The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more. | CVSS3: 7.5 | 0% Низкий | около 3 лет назад |
![]() | CVSS3: 7.5 | 0% Низкий | около 3 лет назад | |
CVE-2022-27780 The curl URL parser wrongly accepts percent-encoded URL separators lik ... | CVSS3: 7.5 | 0% Низкий | около 3 лет назад | |
GHSA-82rv-h33p-2xgc The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more. | CVSS3: 7.5 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу