[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 6529 Download | Alert*

Two vulnerabilities were discovered in Curl, an easy-to-use client-side URL transfer library, which could result in denial of service or information disclosure.

Two vulnerabilities were discovered in Curl, an easy-to-use client-side URL transfer library, which could result in denial of service or information disclosure.

Patrick Monnerat discovered that Curl"s support for "chained" HTTP compression algorithms was susceptible to denial of service.

Patrick Monnerat discovered that Curl"s support for "chained" HTTP compression algorithms was susceptible to denial of service.

Two security issues were found in Curl, an easy-to-use client-side URL transfer library and command line tool: CVE-2023-38545 Jay Satiro discovered a buffer overflow in the SOCKS5 proxy handshake. CVE-2023-38546 It was discovered that under some circumstances libcurl was susceptible to cookie injection.

Two security issues were found in Curl, an easy-to-use client-side URL transfer library and command line tool: CVE-2023-38545 Jay Satiro discovered a buffer overflow in the SOCKS5 proxy handshake. CVE-2023-38546 It was discovered that under some circumstances libcurl was susceptible to cookie injection.

An untrusted search path vulnerability was discovered in Node.js, which could result in unexpected searching or loading ICU data when running with elevated privileges.

Multiple vulnerabilities were discovered in Node.js, which could result in HTTP request smuggling, bypass of policy feature checks, denial of service or loading of incorrect ICU data.

Multiple vulnerabilities were discovered in Node.js, which could result in HTTP request smuggling, bypass of policy feature checks, denial of service or loading of incorrect ICU data.

The Qualys Research Labs discovered several vulnerabilities in the GNU C Library"s __vsyslog_internal function . A heap-based buffer overflow , an off-by-one heap overflow and an integer overflow can be exploited for privilege escalation or denial of service. Details can be found in the Qualys advisory at https://www.qualys.com/2024/01/30/syslog Additionally a memory corruption was discovered in ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   652

© SecPod Technologies