libcurl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libcurl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Read

*
  • M
Missing Release of Resource after Effective Lifetime

<0:7.61.1-34.el8_10.2
  • M
Information Exposure

<0:7.61.1-33.el8_9.5
  • M
External Control of File Name or Path

<0:7.61.1-33.el8_9.5
  • M
Expected Behavior Violation

<0:7.61.1-33.el8_9.5
  • M
Improper Certificate Validation

<0:7.61.1-30.el8_8.3
  • M
Authentication Bypass by Primary Weakness

<0:7.61.1-30.el8_8.3
  • M
Authentication Bypass by Primary Weakness

<0:7.61.1-30.el8_8.2
  • L
Directory Traversal

*
  • M
Allocation of Resources Without Limits or Throttling

<0:7.61.1-25.el8_7.3
  • L
Use After Free

<0:7.61.1-30.el8
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.61.1-30.el8
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.61.1-22.el8_6.4
  • M
Allocation of Resources Without Limits or Throttling

<0:7.61.1-22.el8_6.4
  • M
Improper Certificate Validation

<0:7.61.1-22.el8_6.3
  • M
Insufficiently Protected Credentials

<0:7.61.1-22.el8_6.3
  • M
Insufficiently Protected Credentials

<0:7.61.1-22.el8_6.3
  • M
Improper Authentication

<0:7.61.1-22.el8_6.3
  • M
Cleartext Transmission of Sensitive Information

<0:7.61.1-18.el8_4.2
  • M
Cleartext Transmission of Sensitive Information

<0:7.61.1-18.el8_4.2
  • M
Improper Certificate Validation

<0:7.61.1-18.el8
  • M
Arbitrary Code Injection

<0:7.61.1-14.el8
  • M
Use After Free

<0:7.61.1-12.el8
  • M
Out-of-bounds Read

<0:7.61.1-11.el8
  • M
Stack-based Buffer Overflow

<0:7.61.1-11.el8
  • M
Out-of-bounds Read

<0:7.61.1-11.el8
  • M
Untrusted Pointer Dereference

<0:7.61.1-18.el8
  • M
Uncontrolled Recursion

<0:7.61.1-18.el8
  • M
Information Exposure

<0:7.61.1-18.el8
  • M
Heap-based Buffer Overflow

<0:7.61.1-12.el8
  • M
Heap-based Buffer Overflow

<0:7.61.1-12.el8
  • M
Information Exposure

<0:7.61.1-11.el8
  • M
Use of Uninitialized Resource

<0:7.61.1-22.el8
  • M
Use of Uninitialized Resource

<0:7.61.1-22.el8
  • M
Insufficiently Protected Credentials

<0:7.61.1-18.el8_4.1
  • M
Improper Input Validation

<0:7.61.1-18.el8_4.1
  • M
Improper Certificate Validation

<0:7.61.1-18.el8_4.1
  • M
Information Exposure

<0:7.61.1-22.el8