CVE-2006-1061
https://notcve.org/view.php?id=CVE-2006-1061
Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path. • http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1326.html http://curl.haxx.se/docs/adv_20060320.html http://secunia.com/advisories/19271 http://secunia.com/advisories/19335 http://secunia.com/advisories/19344 http://secunia.com/advisories/19371 http://www.gentoo.org/security/en/glsa/glsa-200603-19.xml http://www.osvdb.org/23982 http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00048.html http://www.securityfocus.com/bid/17154 http://www •
CVE-2005-4077
https://notcve.org/view.php?id=CVE-2005-4077
Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt http://curl.haxx.se/docs/adv_20051207.html http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2006/May/msg00003.html http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://qa.openoffice.org/issues/show_bug.cgi?id=59032 http://secunia.com/advisories/17907 http://secunia.com/advisories/17960 http://secunia.com/advisories/17961& • CWE-189: Numeric Errors •
CVE-2000-0973 – cURL 6.1 < 7.4 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0973
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated. • https://www.exploit-db.com/exploits/20292 https://www.exploit-db.com/exploits/20293 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:72.curl.asc http://archives.neohapsis.com/archives/bugtraq/2000-10/0331.html http://www.securityfocus.com/bid/1804 https://exchange.xforce.ibmcloud.com/vulnerabilities/5374 •