libcurl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libcurl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

*
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Information Exposure

<0:7.76.1-26.el9_3.3
  • M
Information Exposure

<0:7.76.1-26.el9_3.3
  • M
Information Exposure

<0:7.76.1-26.el9_3.3
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-29.el9_4.1
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-29.el9_4.1
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-29.el9_4.1
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • L
Information Exposure

*
  • L
Comparison Using Wrong Factors

*
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-29.el9_4.1
  • M
Information Exposure

<0:7.76.1-26.el9_3.3
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • L
Out-of-bounds Read

*
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-23.el9_2.7
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-23.el9_2.7
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-23.el9_2.7
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-29.el9_4.1
  • M
Information Exposure

<0:7.76.1-23.el9_2.6
  • M
Information Exposure

<0:7.76.1-23.el9_2.6
  • M
Information Exposure

<0:7.76.1-23.el9_2.6
  • M
Information Exposure

<0:7.76.1-14.el9_0.11
  • M
Information Exposure

<0:7.76.1-14.el9_0.11
  • M
Information Exposure

<0:7.76.1-26.el9_3.3
  • H
External Control of File Name or Path

<0:7.76.1-23.el9_2.4
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
External Control of File Name or Path

<0:7.76.1-14.el9_0.9
  • H
External Control of File Name or Path

<0:7.76.1-23.el9_2.4
  • H
External Control of File Name or Path

<0:7.76.1-23.el9_2.4
  • H
External Control of File Name or Path

<0:7.76.1-14.el9_0.9
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-14.el9_0.9
  • H
Out-of-Bounds

<0:7.76.1-23.el9_2.4
  • H
Out-of-Bounds

<0:7.76.1-14.el9_0.9
  • H
Out-of-Bounds

<0:7.76.1-23.el9_2.4
  • H
Out-of-Bounds

<0:7.76.1-23.el9_2.4
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.7
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.7
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.7
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.7
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.6
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.6
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Use After Free

<0:7.76.1-23.el9
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.6
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.6
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4