Filtered by vendor Daniel Stenberg
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-1868 | 1 Daniel Stenberg | 1 Dispair | 2022-10-03 | N/A |
Dispair 0.1 and 0.2 allows remote attackers to execute arbitrary shell commands via certain form fields. | ||||
CVE-2005-4077 | 1 Daniel Stenberg | 1 Curl | 2018-10-19 | N/A |
Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string. | ||||
CVE-2000-0973 | 1 Daniel Stenberg | 1 Curl | 2018-05-03 | N/A |
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated. | ||||
CVE-2007-3153 | 1 Daniel Stenberg | 1 C-ares | 2017-07-29 | N/A |
The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values. | ||||
CVE-2007-3152 | 1 Daniel Stenberg | 1 C-ares | 2017-07-29 | N/A |
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value. | ||||
CVE-2006-1061 | 1 Daniel Stenberg | 1 Curl | 2017-07-20 | N/A |
Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path. |
Page 1 of 1.