Tag
high
advisory
Multiple Vulnerabilities in cURL
2 rules 3 TTPs 4 CVEsMultiple vulnerabilities in cURL could allow an attacker to bypass security measures, disclose confidential information, or manipulate data.
cURL
vulnerability
2r
3t
4c
medium
advisory
cURL Vulnerability Allows File Manipulation
2 rules 2 TTPsA remote, anonymous attacker can exploit a vulnerability in cURL to manipulate files on a vulnerable system.
curl
vulnerability
file-manipulation
2r
2t