Логотип exploitDog
bind:CVE-2009-0037
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2009-0037

Количество 7

Количество 7

ubuntu логотип

CVE-2009-0037

больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

CVSS2: 6.8
EPSS: Низкий
redhat логотип

CVE-2009-0037

больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2009-0037

больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2009-0037

больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, w ...

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-jr23-52fg-m7rm

около 3 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

EPSS: Низкий
oracle-oval логотип

ELSA-2009-0341

больше 16 лет назад

ELSA-2009-0341: curl security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-09374

больше 16 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2009-0037

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

CVSS2: 6.8
1%
Низкий
больше 16 лет назад
redhat логотип
CVE-2009-0037

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

CVSS2: 4.3
1%
Низкий
больше 16 лет назад
nvd логотип
CVE-2009-0037

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

CVSS2: 6.8
1%
Низкий
больше 16 лет назад
debian логотип
CVE-2009-0037

The redirect implementation in curl and libcurl 5.11 through 7.19.3, w ...

CVSS2: 6.8
1%
Низкий
больше 16 лет назад
github логотип
GHSA-jr23-52fg-m7rm

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

1%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2009-0341

ELSA-2009-0341: curl security update (MODERATE)

больше 16 лет назад
fstec логотип
BDU:2015-09374

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 6.8
1%
Низкий
больше 16 лет назад

Уязвимостей на страницу