libcurl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libcurl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Information Exposure

*
  • L
Comparison Using Wrong Factors

*
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-29.el9_4.1
  • M
Information Exposure

<0:7.76.1-26.el9_3.3
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Special Element Injection

<0:7.76.1-26.el9
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • L
Out-of-bounds Read

*
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-23.el9_2.7
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-23.el9_2.7
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-23.el9_2.7
  • M
Missing Release of Resource after Effective Lifetime

<0:7.76.1-29.el9_4.1
  • M
Information Exposure

<0:7.76.1-23.el9_2.6
  • M
Information Exposure

<0:7.76.1-23.el9_2.6
  • M
Information Exposure

<0:7.76.1-23.el9_2.6
  • M
Information Exposure

<0:7.76.1-14.el9_0.11
  • M
Information Exposure

<0:7.76.1-14.el9_0.11
  • M
Information Exposure

<0:7.76.1-26.el9_3.3
  • H
External Control of File Name or Path

<0:7.76.1-14.el9_0.9
  • H
External Control of File Name or Path

<0:7.76.1-23.el9_2.4
  • H
External Control of File Name or Path

<0:7.76.1-23.el9_2.4
  • H
External Control of File Name or Path

<0:7.76.1-23.el9_2.4
  • H
External Control of File Name or Path

<0:7.76.1-14.el9_0.9
  • H
External Control of File Name or Path

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-26.el9_3.2
  • H
Out-of-Bounds

<0:7.76.1-23.el9_2.4
  • H
Out-of-Bounds

<0:7.76.1-23.el9_2.4
  • H
Out-of-Bounds

<0:7.76.1-14.el9_0.9
  • H
Out-of-Bounds

<0:7.76.1-23.el9_2.4
  • H
Out-of-Bounds

<0:7.76.1-14.el9_0.9
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.7
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.7
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Expected Behavior Violation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.7
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.7
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Improper Certificate Validation

<0:7.76.1-23.el9_2.2
  • M
Special Element Injection

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-26.el9
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Authentication Bypass by Primary Weakness

<0:7.76.1-23.el9_2.1
  • M
Directory Traversal

<0:7.76.1-26.el9
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.6
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.6
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-19.el9_1.2
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Use After Free

<0:7.76.1-23.el9
  • L
Use After Free

<0:7.76.1-23.el9
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.6
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-19.el9_1.1
  • M
Expected Behavior Violation

<0:7.76.1-14.el9_0.6
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • L
Improper Validation of Syntactic Correctness of Input

<0:7.76.1-23.el9
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Allocation of Resources Without Limits or Throttling

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Preservation of Permissions

<0:7.76.1-14.el9_0.5
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • M
Improper Certificate Validation

<0:7.76.1-14.el9_0.4
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • L
Information Exposure

<0:7.76.1-19.el9
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Insufficiently Protected Credentials

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4
  • M
Improper Authentication

<0:7.76.1-14.el9_0.4