curl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the curl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Use After Free

*
  • M
Free of Memory not on the Heap

*
  • L
Integer Overflow to Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Use of Uninitialized Resource

*
  • L
Use of Uninitialized Resource

*
  • L
Use of Uninitialized Resource

*
  • L
Heap-based Buffer Overflow

*
  • L
Untrusted Pointer Dereference

*
  • L
Information Exposure

*
  • L
Out-of-bounds Read

*
  • L
Comparison Using Wrong Factors

*
  • L
Improper Certificate Validation

*
  • L
Improper Authentication

*
  • M
Information Exposure

*
  • L
Improper Synchronization

*
  • M
Use After Free

*
  • M
Improper Certificate Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Write

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • L
Improper Certificate Validation

*
  • L
Out-of-bounds Read

*
  • L
Improper Certificate Validation

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Authentication

*
  • M
Improper Certificate Validation

*
  • M
Resource Injection

*
  • M
Integer Overflow or Wraparound

*
  • M
Stack-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Improper Certificate Validation

*
  • M
Information Exposure

*
  • M
Stack-based Buffer Overflow

*
  • M
Out-of-bounds Read

*
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Authentication Bypass

*
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Cleartext Transmission of Sensitive Information

*
  • M
Information Exposure

*
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Arbitrary Code Injection

*
  • M
Information Exposure

*
  • M
Authentication Bypass by Primary Weakness

*
  • M
Improper Certificate Validation

*