curl vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://curl.se|curl package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Multiple Releases of Same Resource or Handle

[8.11.1,8.12.0)
  • M
Credential Exposure

[7.76.0,8.12.0)
  • H
Integer Overflow to Buffer Overflow

[7.10.5,8.12.0)
  • M
Information Exposure

[6.5.0,8.11.1)
  • M
Comparison Using Wrong Factors

[7.74.0,8.11.0)
  • M
Improper Certificate Validation

[7.41.0,8.10.0)
  • M
Out-of-bounds Read

[7.32.0,8.9.1)
  • H
Out-of-bounds Read

[,8.9.0)
  • M
Free of Memory not on the Heap

[8.6.0,8.9.0)
  • M
Improper Certificate Validation

[8.5.0,8.7.0)
  • L
Improper Certificate Validation

[8.6.0,8.7.0)
  • L
Authentication Bypass by Spoofing

[7.85.0,8.7.0)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[7.44.0,8.7.0)
  • L
Improper Check for Certificate Revocation

[8.5.0,8.6.0)
  • M
Information Exposure

[7.46.0,8.5.0)
  • M
Missing Encryption of Sensitive Data

[7.84.0,8.5.0)
  • L
External Control of File Name or Path

[7.9.1,8.4.0)
  • H
Heap-based Buffer Overflow

[7.69.0,8.4.0)
  • M
Allocation of Resources Without Limits or Throttling

[7.84.0,8.3.0)
  • M
Time-of-check Time-of-use (TOCTOU) Race Condition

[,8.2.0)
  • L
Improper Synchronization

[7.9.8,8.1.0)
  • M
Improper Certificate Validation

[7.12.0,8.1.0)
  • M
Expected Behavior Violation

[7.7,8.1.0)
  • M
Use After Free

[7.81.0,8.1.0)
  • M
Double Free

[,8.0.0)
  • M
Authentication Bypass by Primary Weakness

[,8.0.0)
  • M
Authentication Bypass

[,8.0.0)
  • M
Directory Traversal

[,8.0.0)
  • M
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)

[7.7,8.0.0)
  • M
Allocation of Resources Without Limits or Throttling

[7.57.0,7.88.0)
  • M
Cleartext Transmission of Sensitive Information

[7.77.0,7.88.0)
  • M
Cleartext Transmission of Sensitive Information

[7.77.0,7.88.0)
  • H
Use After Free

[,7.87.0]
  • M
Cleartext Transmission of Sensitive Information

[7.77.0,7.87.0)
  • L
Stack-based Buffer Overflow

[7.84.0,7.86.0)
  • M
Cleartext Transmission of Sensitive Information

[7.77.0,7.86.0)
  • M
Double Free

[7.77.0,7.86.0)
  • M
Expected Behavior Violation

[7.7,7.86.0)
  • L
Improper Validation of Syntactic Correctness of Input

[,7.85.0)
  • M
Improper Preservation of Permissions

[,7.84.0)
  • M
Denial of Service (DoS)

[,7.84.0)
  • M
Improper Enforcement of Message Integrity During Transmission in a Communication Channel

[,7.84.0)
  • M
Denial of Service (DoS)

[,7.84.0)
  • M
Improper Authentication

[7.16.1,7.83.1)
  • M
Cleartext Transmission of Sensitive Information

[7.82.0,7.83.1)
  • M
Infinite loop

[7.34.0,7.83.1)
  • M
Inappropriate Encoding for Output Context

[7.80.0,7.83.1)
  • M
Release of Invalid Pointer or Reference

[7.83.0,7.83.1)
  • M
Information Exposure

[,7.83.1)
  • L
Information Exposure

[,7.83.0)
  • M
Improper Authentication

[,7.83.0)
  • M
Insufficiently Protected Credentials

[,7.83.0)
  • M
Open Redirect

[,7.83.0)
  • M
Cryptographic Issues

[0,7.33.0)
  • M
Improper Validation

[7.27.0,7.78.0)
  • M
Directory Traversal

[7.20.0,7.21.1]
  • H
Resources Downloaded over Insecure Protocol

[7.20.0,7.79.0)
  • H
Out-of-bounds Write

[7.21.0,7.74.0)
  • H
Improper Initialization

[,7.52.1)
  • H
Arbitrary Code Injection

[7.62.0,7.71.0)
  • C
Out-of-bounds Read

[7.20.0,7.59.0)
  • H
Improper Certificate Validation

[7.52.0,7.54.0)
  • H
Improper Input Validation

[,7.51.0)
  • C
Out-of-Bounds

[0,7.57.0)
  • M
Cross-site Request Forgery (CSRF)

[5.11,7.19.3]
  • M
Insufficiently Protected Credentials

[7.27.0,7.78.0)
  • M
Improper Authentication

[0,7.35.0)
  • M
Use of Uninitialized Resource

[7.7,7.78.0)
  • M
Out-of-Bounds

[,7.54.1)
  • H
Cryptographic Issues

[7.4,7.19.5]
  • C
Integer Overflow or Wraparound

[,7.61.1)
  • M
Improper Input Validation

[0,7.49.0)
  • M
Improper Input Validation

[0,7.40.0)
  • M
Cryptographic Issues

[0,7.36.0)
  • H
Access Restriction Bypass

[7.14,7.16.3]
  • C
Double Free

[7.73.0,7.79.0)
  • H
NULL Pointer Dereference

[7.21.0,7.59.0)
  • M
Information Exposure

[,7.43.0)
  • C
Out-of-bounds Write

[7.54.1,7.61.0)
  • C
Integer Overflow or Wraparound

[,7.50.3)
  • C
Out-of-bounds Write

[7.12.3,7.59.0)
  • C
Out-of-bounds Write

[7.54.1,7.60.0)
  • C
Use After Free

[7.59.0,7.62.0)
  • M
Out-of-Bounds

[0,7.31.0)
  • H
Improper Certificate Validation

[7.33.0,7.78.0)
  • M
Access Restriction Bypass

[0,7.42.0)
  • H
Heap-based Buffer Overflow

[,7.52.0)
  • M
Access Restriction Bypass

[7.10.5,7.19.7]
  • M
Insufficiently Protected Credentials

[7.10.6,7.21.7)
  • M
Improper Authentication

[0,7.36.0)
  • M
Improper Input Validation

[0,7.34.0)
  • H
Remote Code Execution (RCE)

[,7.65.2)
  • M
Improper Input Validation

[0,7.43.0)
  • C
Buffer Overflow

[6.0,7.4]
  • H
Improper Certificate Validation

[7.41.0,7.74.0)
  • M
Insufficiently Protected Credentials

[,7.51.0)
  • M
Improper Input Validation

[7.27.0,7.36.0]
  • C
Out-of-bounds Read

[7.21.0,7.57.0)
  • C
Improper Authentication

[,7.19.7-53)
  • C
Out-of-bounds Read

[7.49.0,7.58.0)
  • C
Out-of-bounds Read

[7.30.0,7.52.0)
  • C
Integer Overflow or Wraparound

[7.36.0,7.57.0)
  • H
Improper Authorization

[,7.50.1)
  • H
Access Restriction Bypass

[,7.49.1)
  • C
Denial of Service (DoS)

[,7.49.1)
  • H
Out-of-Bounds

[0,7.42.0)
  • C
Out-of-bounds Read

[,7.51.0)
  • M
Information Exposure

[0,7.55.0)
  • H
Use After Free

[,7.51.0)
  • M
Denial of Service (DoS)

[7.11.2,7.15]
  • C
Double Free

[,7.51.0)
  • H
Improper Input Validation

[,7.51.0)
  • M
Improper Access Control

[0,7.42.0)
  • H
Out-of-bounds Write

[,7.51.0)
  • L
Out-of-Bounds

[0,7.54.0)
  • H
Out-of-bounds Read

[7.34.0,7.64.0)
  • M
Information Exposure

[0,7.55.0)
  • H
Out-of-Bounds

[0,7.42.0)
  • C
Double Free

[,7.51.0)
  • C
Out-of-bounds Read

[7.14.1,7.62.0)
  • M
Cryptographic Issues

[,7.38.0)
  • H
Use After Free

[,7.50.1)
  • H
Information Exposure

[7.62.0,7.71.0)
  • L
Integer Overflow or Wraparound

[7.62.0,7.65.0)
  • M
Improper Input Validation

[,7.47.0)
  • H
Insufficiently Protected Credentials

[7.1.0,7.10.7)
  • H
Out-of-Bounds

[0,7.56.0)
  • M
Insufficient Verification of Data Authenticity

[7.20.0,7.79.0)
  • H
Out-of-Bounds

[7.26.0,7.28.1]
  • M
Information Exposure

[0,7.43.0)
  • H
Out-of-bounds Read

[7.36.0,7.64.0)
  • H
Out-of-bounds Read

[,7.51.0)
  • C
Out-of-bounds Write

[,7.51.0)
  • H
Out-of-Bounds

[,7.13.2]
  • H
Improper Certificate Validation

[7.30.0,7.52.0)
  • C
Information Exposure

[7.1,7.58.0)
  • H
Use After Free

[7.75.0,7.77.0)
  • M
Information Exposure

[7.61.0,7.77.0)
  • H
Use After Free

[7.29.0,7.72.0)
  • L
Exposure of Sensitive Information to an Unauthorized Actor

[,7.74.0)
  • M
CRLF Injection

[0,7.40.0)
  • H
Improper Authentication

[,7.50.2)
  • M
Information Exposure

[7.1.1,7.76.0)
  • H
Buffer Overflow

[7.15.0,7.15.2]
  • M
Improper Certificate Validation

[,7.53.0)
  • L
Race Condition

[7.10.4,7.77.0)
  • C
Out-of-bounds Write

[7.36.0,7.64.0)
  • M
Information Exposure

[0,7.39.0)
  • H
SQL Injection

[,7.24.0)
  • H
Resource Injection

[,7.51.0)
  • M
Out-of-Bounds

[0,7.55.0)
  • C
Buffer Overflow

[7.19.4,7.66.0)
  • C
Double Free

[7.52.0,7.66.0)
  • M
Cryptographic Issues

[,7.38.0)
  • L
User Impersonation

[7.63.0,7.76.0)
  • H
Out-of-bounds Write

[7.19.4,7.65.0)
  • H
Cryptographic Issues

[,7.50.1)
  • C
Out-of-bounds Read

[7.20.0,7.60.0)
  • M
Information Exposure

[,7.30.0)
  • H
Improper Authentication

[,7.47.0)
  • C
Out-of-Bounds

[7.33.0,7.62.0)
  • C
Out-of-Bounds

[7.20.0,7.56.1)
  • L
Missing Initialization of Resource

[7.7,7.77.0)
  • M
Arbitrary Code Execution

[,7.12.1]