Vulnerabilities > Daniel Stenberg > Curl

DATE CVE VULNERABILITY TITLE RISK
2006-03-21 CVE-2006-1061 Buffer Overflow vulnerability in Daniel Stenberg Curl 7.15.0/7.15.1/7.15.2
Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.
network
low complexity
daniel-stenberg
7.5
2005-12-08 CVE-2005-4077 Numeric Errors vulnerability in Daniel Stenberg Curl
Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.
local
low complexity
daniel-stenberg CWE-189
4.6
2000-12-19 CVE-2000-0973 Unspecified vulnerability in Daniel Stenberg Curl
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.
network
low complexity
daniel-stenberg
critical
10.0