httpd24-libcurl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the httpd24-libcurl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Preservation of Permissions

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Improper Certificate Validation

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • M
Improper Authentication

*
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Buffer Overflow

<0:7.61.1-1.el7
  • M
Use After Free

<0:7.61.1-1.el7
  • L
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • M
Resource Exhaustion

<0:7.61.1-1.el7
  • M
Improper Input Validation

<0:7.61.1-1.el7
  • M
Integer Overflow or Wraparound

<0:7.61.1-1.el7
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Improper Input Validation

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
NULL Pointer Dereference

<0:7.61.1-1.el7
  • M
Heap-based Buffer Overflow

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Improper Certificate Validation

*
  • M
Use After Free

<0:7.47.1-4.el7
  • M
Arbitrary Code Injection

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Untrusted Pointer Dereference

*
  • M
Uncontrolled Recursion

*
  • M
Information Exposure

*
  • M
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Incorrect Calculation of Buffer Size

<0:7.61.1-1.el7
  • M
Authentication Bypass by Primary Weakness

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Out-of-bounds Write

<0:7.61.1-1.el7
  • M
Information Exposure

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Out-of-bounds Write

<0:7.61.1-1.el7
  • M
Out-of-bounds Write

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Improper Authentication

<0:7.61.1-1.el7
  • M
Heap-based Buffer Overflow

<0:7.61.1-1.el7
  • M
Out-of-bounds Read

<0:7.61.1-1.el7
  • M
Improper Certificate Validation

<0:7.61.1-1.el7
  • M
Improper Input Validation

<0:7.61.1-1.el7
  • M
Use After Free

<0:7.61.1-1.el7
  • M
Improper Input Validation

<0:7.61.1-1.el7
  • M
Integer Overflow or Wraparound

<0:7.61.1-1.el7
  • M
Use After Free

<0:7.61.1-1.el7
  • M
Out-of-bounds Write

<0:7.61.1-1.el7
  • M
Integer Overflow or Wraparound

<0:7.61.1-1.el7
  • M
Use After Free

<0:7.61.1-1.el7
  • M
Resource Injection

<0:7.61.1-1.el7
  • L
Use of Uninitialized Resource

*
  • L
Use of Uninitialized Resource

*
  • M
Improper Certificate Validation

*
  • M
Information Exposure

*
  • M
Improper Certificate Validation

<0:7.61.1-1.el7
  • M
Improper Certificate Validation

<0:7.61.1-1.el7