Количество 15
Количество 15
GHSA-rjqf-6h27-xqfp
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CVE-2021-22925
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CVE-2021-22925
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.

CVE-2021-22925
curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
CVE-2021-22925
curl supports the `-t` command line option, known as `CURLOPT_TELNETOP ...

RLSA-2021:4511
Moderate: curl security and bug fix update

BDU:2022-00343
Уязвимость служебной программы командной строки cURL, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить доступ к конфиденциальным данным
ELSA-2021-4511
ELSA-2021-4511: curl security and bug fix update (MODERATE)

openSUSE-SU-2021:2439-1
Security update for curl

openSUSE-SU-2021:1088-1
Security update for curl

SUSE-SU-2021:2462-1
Security update for curl

SUSE-SU-2021:2440-1
Security update for curl

SUSE-SU-2021:2439-1
Security update for curl

SUSE-SU-2021:2425-1
Security update for curl

SUSE-SU-2021:14768-1
Security update for curl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-rjqf-6h27-xqfp curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application. | CVSS3: 5.3 | 0% Низкий | около 3 лет назад | |
![]() | CVE-2021-22925 curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application. | CVSS3: 5.3 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-22925 curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application. | CVSS3: 3.1 | 0% Низкий | почти 4 года назад |
![]() | CVE-2021-22925 curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application. | CVSS3: 5.3 | 0% Низкий | почти 4 года назад |
CVE-2021-22925 curl supports the `-t` command line option, known as `CURLOPT_TELNETOP ... | CVSS3: 5.3 | 0% Низкий | почти 4 года назад | |
![]() | RLSA-2021:4511 Moderate: curl security and bug fix update | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2022-00343 Уязвимость служебной программы командной строки cURL, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 5.3 | 0% Низкий | почти 4 года назад |
ELSA-2021-4511 ELSA-2021-4511: curl security and bug fix update (MODERATE) | больше 3 лет назад | |||
![]() | openSUSE-SU-2021:2439-1 Security update for curl | почти 4 года назад | ||
![]() | openSUSE-SU-2021:1088-1 Security update for curl | почти 4 года назад | ||
![]() | SUSE-SU-2021:2462-1 Security update for curl | почти 4 года назад | ||
![]() | SUSE-SU-2021:2440-1 Security update for curl | почти 4 года назад | ||
![]() | SUSE-SU-2021:2439-1 Security update for curl | почти 4 года назад | ||
![]() | SUSE-SU-2021:2425-1 Security update for curl | почти 4 года назад | ||
![]() | SUSE-SU-2021:14768-1 Security update for curl | почти 4 года назад |
Уязвимостей на страницу