CVE-2021-22876
- EPSS 0.06%
- Published 01.04.2021 18:15:12
- Last modified 09.06.2025 15:15:23
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically...
CVE-2021-22890
- EPSS 0.13%
- Published 01.04.2021 18:15:12
- Last modified 09.06.2025 15:15:24
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving fro...
CVE-2021-28041
- EPSS 0.26%
- Published 05.03.2021 21:15:13
- Last modified 21.11.2024 05:59:01
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
CVE-2020-27223
- EPSS 33.82%
- Published 26.02.2021 22:15:19
- Last modified 20.08.2025 10:15:27
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) ...
CVE-2021-3156
- EPSS 92.26%
- Published 26.01.2021 21:15:12
- Last modified 03.04.2025 19:47:48
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
CVE-2021-23239
- EPSS 0.04%
- Published 12.01.2021 09:15:14
- Last modified 21.11.2024 05:51:25
The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
CVE-2021-23240
- EPSS 0.17%
- Published 12.01.2021 09:15:14
- Last modified 21.11.2024 05:51:25
selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in p...
- EPSS 6.41%
- Published 08.01.2021 16:15:15
- Last modified 21.11.2024 05:39:04
Element OS versions prior to 1.8P1 and 12.2 are susceptible to a vulnerability that could allow an unauthenticated remote attacker to perform arbitrary code execution.
CVE-2020-8286
- EPSS 0.28%
- Published 14.12.2020 20:15:14
- Last modified 21.11.2024 05:38:39
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
CVE-2020-8284
- EPSS 0.1%
- Published 14.12.2020 20:15:13
- Last modified 21.11.2024 05:38:39
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed,...