Splunk

Universal Forwarder

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 02.06.2022 14:15:44
  • Zuletzt bearbeitet 21.11.2024 06:56:10

The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0....

Exploit
  • EPSS 0.46%
  • Veröffentlicht 02.06.2022 14:15:43
  • Zuletzt bearbeitet 21.11.2024 06:56:10

A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.

Exploit
  • EPSS 0.57%
  • Veröffentlicht 02.06.2022 14:15:43
  • Zuletzt bearbeitet 21.11.2024 06:56:09

A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 02.06.2022 14:15:43
  • Zuletzt bearbeitet 21.11.2024 06:56:09

An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.

Exploit
  • EPSS 0.51%
  • Veröffentlicht 02.06.2022 14:15:43
  • Zuletzt bearbeitet 21.11.2024 06:56:09

An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to ...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 26.05.2022 17:15:09
  • Zuletzt bearbeitet 21.11.2024 06:47:03

An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for th...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 29.09.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:50:59

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not ...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 29.09.2021 20:15:08
  • Zuletzt bearbeitet 21.11.2024 05:50:59

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This ...

Exploit
  • EPSS 0.35%
  • Veröffentlicht 23.09.2021 13:15:08
  • Zuletzt bearbeitet 09.06.2025 15:15:25

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

Exploit
  • EPSS 0.51%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:56

libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Trans...