libcurl-minimal vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libcurl-minimal package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

<0:8.5.0-1.amzn2023.0.2
  • M
Misinterpretation of Input

<0:8.5.0-1.amzn2023.0.4
  • M
Missing Release of Resource after Effective Lifetime

<0:8.5.0-1.amzn2023.0.4
  • L
Improper Check for Certificate Revocation

<0:8.5.0-1.amzn2023.0.3
  • L
ALAS2023-2024-558

<0:8.5.0-1.amzn2023.0.2
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:7.87.0-2.amzn2023.0.2
  • L
Missing Encryption of Sensitive Data

<0:8.5.0-1.amzn2023.0.1
  • M
Information Exposure

<0:8.5.0-1.amzn2023.0.1
  • H
Out-of-Bounds

<0:8.3.0-1.amzn2023.0.2
  • H
External Control of File Name or Path

<0:8.3.0-1.amzn2023.0.2
  • H
Allocation of Resources Without Limits or Throttling

<0:8.3.0-1.amzn2023.0.1
  • M
Improper Certificate Validation

<0:8.0.1-1.amzn2023.0.1
  • M
Expected Behavior Violation

<0:8.0.1-1.amzn2023.0.1
  • M
Use After Free

<0:8.0.1-1.amzn2023.0.1
  • M
Double Free

<0:8.0.1-1.amzn2023
  • M
Authentication Bypass by Primary Weakness

<0:8.0.1-1.amzn2023
  • M
Authentication Bypass by Primary Weakness

<0:8.0.1-1.amzn2023
  • M
Authentication Bypass by Primary Weakness

<0:8.0.1-1.amzn2023
  • M
Directory Traversal

<0:8.0.1-1.amzn2023
  • M
Special Element Injection

<0:8.0.1-1.amzn2023
  • M
Cleartext Transmission of Sensitive Information

<0:7.88.0-1.amzn2023.0.1
  • M
Allocation of Resources Without Limits or Throttling

<0:7.88.0-1.amzn2023.0.1
  • M
Cleartext Transmission of Sensitive Information

<0:7.88.0-1.amzn2023.0.1
  • M
Use After Free

<0:7.87.0-2.amzn2023.0.2
  • M
Cleartext Transmission of Sensitive Information

<0:7.87.0-2.amzn2023.0.2
  • M
Cleartext Transmission of Sensitive Information

<0:7.87.0-2.amzn2023.0.2
  • M
Stack-based Buffer Overflow

<0:7.87.0-2.amzn2023.0.2
  • M
Double Free

<0:7.87.0-2.amzn2023.0.2
  • M
Improper Validation of Syntactic Correctness of Input

<0:7.87.0-2.amzn2023.0.2
  • M
Expected Behavior Violation

<0:7.87.0-2.amzn2023.0.2
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.87.0-2.amzn2023.0.2
  • M
Improper Preservation of Permissions

<0:7.87.0-2.amzn2023.0.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.87.0-2.amzn2023.0.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.87.0-2.amzn2023.0.2
  • M
Cleartext Transmission of Sensitive Information

<0:7.87.0-2.amzn2023.0.2
  • M
Improper Certificate Validation

<0:7.87.0-2.amzn2023.0.2
  • M
Inappropriate Encoding for Output Context

<0:7.87.0-2.amzn2023.0.2
  • M
Information Exposure

<0:7.87.0-2.amzn2023.0.2
  • M
Insufficiently Protected Credentials

<0:7.87.0-2.amzn2023.0.2
  • M
Information Exposure

<0:7.87.0-2.amzn2023.0.2
  • M
Insufficiently Protected Credentials

<0:7.87.0-2.amzn2023.0.2
  • M
Improper Authentication

<0:7.87.0-2.amzn2023.0.2