Vulnerabilities > Daniel Stenberg

DATE CVE VULNERABILITY TITLE RISK
2007-06-11 CVE-2007-3153 Remote Cache Poisoning vulnerability in C-Ares DNS Library
The ares_init:randomize_key function in c-ares, on platforms other than Windows, uses a weak facility for producing a random number sequence (Unix rand), which makes it easier for remote attackers to spoof DNS responses by guessing certain values.
network
low complexity
daniel-stenberg
5.0
2007-06-11 CVE-2007-3152 Remote Cache Poisoning vulnerability in C-Ares DNS Library
c-ares before 1.4.0 uses a predictable seed for the random number generator for the DNS Transaction ID field, which might allow remote attackers to spoof DNS responses by guessing the field value.
network
low complexity
daniel-stenberg
7.5
2006-03-21 CVE-2006-1061 Buffer Overflow vulnerability in Daniel Stenberg Curl 7.15.0/7.15.1/7.15.2
Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.
network
low complexity
daniel-stenberg
7.5
2005-12-08 CVE-2005-4077 Numeric Errors vulnerability in Daniel Stenberg Curl
Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.
local
low complexity
daniel-stenberg CWE-189
4.6
2002-12-31 CVE-2002-1868 Remote Command Execution vulnerability in Daniel Stenberg Dispair 0.1/0.2
Dispair 0.1 and 0.2 allows remote attackers to execute arbitrary shell commands via certain form fields.
network
low complexity
daniel-stenberg
critical
10.0
2000-12-19 CVE-2000-0973 Unspecified vulnerability in Daniel Stenberg Curl
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.
network
low complexity
daniel-stenberg
critical
10.0