Splunk

Universal Forwarder

62 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.56%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:56

libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Trans...

Exploit
  • EPSS 0.42%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:55

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be ...

Exploit
  • EPSS 0.75%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 09.06.2025 15:15:24

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the invo...

Exploit
  • EPSS 0.12%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:55

When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 05.08.2021 21:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:55

When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, p...

  • EPSS 0.09%
  • Veröffentlicht 03.08.2021 19:15:08
  • Zuletzt bearbeitet 05.05.2025 17:17:03

Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

  • EPSS 0.1%
  • Veröffentlicht 20.07.2021 07:15:07
  • Zuletzt bearbeitet 03.11.2025 22:15:49

libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).

Exploit
  • EPSS 0.34%
  • Veröffentlicht 11.06.2021 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:52

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentia...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 11.06.2021 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:50:52

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NE...

Exploit
  • EPSS 1.12%
  • Veröffentlicht 11.06.2021 16:15:10
  • Zuletzt bearbeitet 21.11.2024 05:50:51

curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" ...