curl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the curl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Arbitrary Code Injection

*
  • C
Buffer Overflow

<7.38.0-4+deb8u16
  • H
Out-of-bounds Write

<7.38.0-4+deb8u15
  • H
Out-of-bounds Read

<7.38.0-4+deb8u14
  • H
Out-of-bounds Read

<7.38.0-4+deb8u14
  • C
Out-of-bounds Write

<7.38.0-4+deb8u14
  • C
Out-of-Bounds

<7.38.0-4+deb8u13
  • C
Out-of-bounds Read

<7.38.0-4+deb8u13
  • C
Integer Overflow or Wraparound

<7.38.0-4+deb8u12
  • H
Credentials Management

<7.10.7-1
  • H
Improper Input Validation

*
  • H
Out-of-bounds Write

<7.38.0-4+deb8u5
  • C
Double Free

<7.38.0-4+deb8u5
  • C
Out-of-bounds Write

<7.38.0-4+deb8u5
  • H
Use After Free

<7.38.0-4+deb8u5
  • H
Out-of-bounds Read

<7.38.0-4+deb8u5
  • C
Out-of-bounds Read

<7.38.0-4+deb8u5
  • H
Resource Injection

<7.38.0-4+deb8u5
  • H
Improper Input Validation

<7.38.0-4+deb8u5
  • C
Double Free

<7.38.0-4+deb8u5
  • M
Credentials Management

<7.38.0-4+deb8u5
  • C
Out-of-bounds Read

<7.38.0-4+deb8u11
  • H
Heap-based Buffer Overflow

<7.38.0-4+deb8u13
  • H
NULL Pointer Dereference

<7.38.0-4+deb8u10
  • C
Out-of-bounds Write

<7.38.0-4+deb8u10
  • C
Out-of-bounds Read

<7.38.0-4+deb8u10
  • C
CVE-2018-1000007

<7.38.0-4+deb8u9
  • C
Integer Overflow or Wraparound

<7.38.0-4+deb8u8
  • C
Out-of-bounds Read

<7.38.0-4+deb8u8
  • C
Out-of-Bounds

<7.38.0-4+deb8u7
  • H
Out-of-Bounds

<7.38.0-4+deb8u6
  • M
Out-of-Bounds

<7.38.0-4+deb8u6
  • M
Information Exposure

<7.38.0-4+deb8u6
  • L
Out-of-Bounds

*
  • C
Integer Overflow or Wraparound

<7.38.0-4+deb8u13
  • H
Improper Authentication

<7.38.0-4+deb8u13
  • H
Improper Authorization

<7.38.0-4+deb8u4
  • H
Use After Free

<7.38.0-4+deb8u4
  • H
Cryptographic Issues

<7.38.0-4+deb8u4
  • M
Improper Input Validation

*
  • H
Improper Authentication

<7.38.0-4+deb8u3
  • M
Information Exposure

<7.38.0-4+deb8u2
  • H
Out-of-Bounds

<7.38.0-4+deb8u1
  • M
Improper Access Control

<7.38.0-4+deb8u1
  • H
Out-of-Bounds

<7.38.0-4+deb8u1
  • M
Access Restriction Bypass

<7.38.0-4+deb8u1
  • M
CVE-2014-8150

<7.38.0-4
  • M
Cryptographic Issues

<7.38.0-1
  • M
Cryptographic Issues

<7.38.0-1
  • M
Information Exposure

<7.38.0-3
  • M
Cryptographic Issues

<7.36.0-1
  • M
Improper Authentication

<7.36.0-1
  • M
Improper Authentication

<7.35.0-1
  • M
Improper Input Validation

<7.34.0-1
  • M
Cryptographic Issues

<7.33.0-1
  • M
Out-of-Bounds

<7.31.0-1
  • M
Information Exposure

<7.29.0-2.1
  • H
Out-of-Bounds

<7.29.0-1
  • H
SQL Injection

<7.24.0-1
  • M
Improper Input Validation

<7.24.0-1
  • M
Credentials Management

<7.21.6-2
  • M
Access Restriction Bypass

<7.20.0-1
  • H
Cryptographic Issues

<7.19.5-1.1
  • M
Cross-site Request Forgery (CSRF)

<7.18.2-8.1
  • H
CVE-2007-3564

<7.16.4-1
  • H
CVE-2006-1061

<7.15.3-1
  • M
Numeric Errors

<7.15.1-1
  • H
Out-of-Bounds

<7.15.0-1
  • H
CVE-2005-0490

<7.13.0-2