Deprecated: Function get_magic_quotes_gpc() is deprecated in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 99
Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 619
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 832
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
Warning: Cannot modify header information - headers already sent by (output started at /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php:99) in /hermes/walnacweb04/walnacweb04ab/b2791/pow.jasaeld/htdocs/De1337/nothing/index.php on line 839
CVE-2025-10148.html;8.11.0;8.15.0;predictable WebSocket mask;CVE-2025-10148;2025-09-10;2025-09-08;CWE-340: Generation of Predictable Numbers or Identifiers;505;WebSocket;-;both;low;https://hackerone.com/reports/3330839
CVE-2025-9086.html;7.31.0;8.15.0;Out of bounds read for cookie path;CVE-2025-9086;2025-09-10;2025-08-11;CWE-125: Out-of-bounds Read;505;cookies;OVERREAD;lib;low;https://hackerone.com/reports/3294999
CVE-2025-5399.html;8.13.0;8.14.0;WebSocket endless loop;CVE-2025-5399;2025-06-04;2025-05-30;CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop');505;WebSocket;-;lib;low;https://hackerone.com/reports/3168039
CVE-2025-5025.html;8.5.0;8.13.0;No QUIC certificate pinning with wolfSSL;CVE-2025-5025;2025-05-28;2025-05-19;CWE-295: Improper Certificate Validation;2540;TLS;-;both;medium;https://hackerone.com/reports/3153497
CVE-2025-4947.html;8.8.0;8.13.0;QUIC certificate check skip with wolfSSL;CVE-2025-4947;2025-05-28;2025-05-17;CWE-295: Improper Certificate Validation;2540;TLS;-;both;medium;https://hackerone.com/reports/3150884
CVE-2025-0725.html;7.10.5;8.11.1;gzip integer overflow;CVE-2025-0725;2025-02-05;2025-01-23;CWE-680: Integer Overflow to Buffer Overflow;505;gzip;OVERFLOW;both;low;https://hackerone.com/reports/2956023
CVE-2025-0665.html;8.11.1;8.11.1;eventfd double close;CVE-2025-0665;2025-02-05;2025-01-22;CWE-1341: Multiple Releases of Same Resource or Handle;505;DNS;-;both;low;https://hackerone.com/reports/2954286
CVE-2025-0167.html;7.76.0;8.11.1;netrc and default credential leak;CVE-2025-0167;2025-02-05;2024-12-30;CWE-200: Exposure of Sensitive Information to an Unauthorized Actor;505;netrc;-;both;low;https://hackerone.com/reports/2917232
CVE-2024-11053.html;7.76.0;8.11.0;netrc and redirect credential leak;CVE-2024-11053;2024-12-11;2024-11-08;CWE-200: Exposure of Sensitive Information to an Unauthorized Actor;505;netrc;-;both;low;https://hackerone.com/reports/2829063
CVE-2024-9681.html;7.74.0;8.10.1;HSTS subdomain overwrites parent cache entry;CVE-2024-9681;2024-11-05;2024-10-07;CWE-1025: Comparison Using Wrong Factors;540;HSTS;-;both;low;https://hackerone.com/reports/2764830
CVE-2024-8096.html;7.41.0;8.9.1;OCSP stapling bypass with GnuTLS;CVE-2024-8096;2024-09-11;2024-08-19;CWE-295: Improper Certificate Validation;2540;TLS;-;both;medium;https://hackerone.com/reports/2669852
CVE-2024-7264.html;7.32.0;8.9.0;ASN.1 date parser overread;CVE-2024-7264;2024-07-31;2024-07-30;CWE-125: Out-of-bounds Read;540;ASN1;OVERREAD;both;low;https://hackerone.com/reports/2629968
CVE-2024-6874.html;8.8.0;8.8.0;macidn punycode buffer overread;CVE-2024-6874;2024-07-24;2024-07-16;CWE-126: Buffer Over-read;540;IDN;OVERREAD;lib;low;https://hackerone.com/reports/2604391
CVE-2024-6197.html;8.6.0;8.8.0;freeing stack buffer in utf8asn1str;CVE-2024-6197;2024-07-24;2024-06-19;CWE-590: Free of Memory not on the Heap;2540;ASN1;BAD_FREE;both;medium;https://hackerone.com/reports/2559516
CVE-2024-2466.html;8.5.0;8.6.0;TLS certificate check bypass with mbedTLS;CVE-2024-2466;2024-03-27;2024-03-14;CWE-297: Improper Validation of Certificate with Host Mismatch;2540;TLS;-;both;medium;https://hackerone.com/reports/2416725
CVE-2024-2398.html;7.44.0;8.6.0;HTTP/2 push headers memory-leak;CVE-2024-2398;2024-03-27;2024-03-05;CWE-772: Missing Release of Resource after Effective Lifetime;2540;HTTP/2;-;lib;medium;https://hackerone.com/reports/2402845
CVE-2024-2379.html;8.6.0;8.6.0;QUIC certificate check bypass with wolfSSL;CVE-2024-2379;2024-03-27;2024-03-10;CWE-295: Improper Certificate Validation;540;QUIC;-;both;low;https://hackerone.com/reports/2410774
CVE-2024-2004.html;7.85.0;8.6.0;Usage of disabled protocol;CVE-2024-2004;2024-03-27;2024-02-15;CWE-115: Misinterpretation of Input;540;control;-;both;low;https://hackerone.com/reports/2384833
CVE-2024-0853.html;8.5.0;8.5.0;OCSP verification bypass with TLS session reuse;CVE-2024-0853;2024-01-31;2023-12-29;CWE-299: Improper Check for Certificate Revocation;540;TLS;-;both;low;https://hackerone.com/reports/2298922
CVE-2023-46219.html;7.84.0;8.4.0;HSTS long filename clears contents;CVE-2023-46219;2023-12-06;2023-11-02;CWE-311: Missing Encryption of Sensitive Data;540;HSTS;-;both;low;https://hackerone.com/reports/2236133
CVE-2023-46218.html;7.46.0;8.4.0;cookie mixed case PSL bypass;CVE-2023-46218;2023-12-06;2023-10-17;CWE-201: Information Exposure Through Sent Data;2540;cookie;-;both;medium;https://hackerone.com/reports/2212193
CVE-2023-38546.html;7.9.1;8.3.0;cookie injection with none file;CVE-2023-38546;2023-10-11;2023-09-14;CWE-73: External Control of filename or Path;540;cookies;-;lib;low;https://hackerone.com/reports/2148242
CVE-2023-38545.html;7.69.0;8.3.0;SOCKS5 heap buffer overflow;CVE-2023-38545;2023-10-11;2023-09-30;CWE-122: Heap-based Buffer Overflow;4660;SOCKS5;OVERFLOW;both;high;https://hackerone.com/reports/2187833
CVE-2023-38039.html;7.84.0;8.2.1;HTTP headers eat all memory;CVE-2023-38039;2023-09-13;2023-07-17;CWE-770: Allocation of Resources Without Limits or Throttling;2540;HTTP;-;both;medium;https://hackerone.com/reports/2072338
CVE-2023-28322.html;7.7;8.0.1;more POST-after-PUT confusion;CVE-2023-28322;2023-05-17;2023-04-19;CWE-440: Expected Behavior Violation;480;HTTP;-;lib;low;https://hackerone.com/reports/1954658
CVE-2023-28321.html;7.12.0;8.0.1;IDN wildcard match;CVE-2023-28321;2023-05-17;2023-04-17;CWE-295: Improper Certificate Validation;480;TLS;-;both;low;https://hackerone.com/reports/1950627
CVE-2023-28320.html;7.9.8;8.0.1;siglongjmp race condition;CVE-2023-28320;2023-05-17;2023-04-02;CWE-662: Improper Synchronization;480;DNS;-;lib;low;https://hackerone.com/reports/1929597
CVE-2023-28319.html;7.81.0;8.0.1;UAF in SSH sha256 fingerprint check;CVE-2023-28319;2023-05-17;2023-03-21;CWE-416: Use After Free;2400;SSH;USE_AFTER_FREE;both;medium;https://hackerone.com/reports/1913733
CVE-2023-27538.html;7.16.1;7.88.1;SSH connection too eager reuse still;CVE-2023-27538;2023-03-20;2023-03-09;CWE-305: Authentication Bypass by Primary Weakness;480;CONNREUSE;-;both;low;https://hackerone.com/reports/1898475
CVE-2023-27537.html;7.88.0;7.88.1;HSTS double free;CVE-2023-27537;2023-03-20;2023-03-08;CWE-415: Double Free;480;HSTS;DOUBLE_FREE;lib;low;https://hackerone.com/reports/1897203
CVE-2023-27536.html;7.22.0;7.88.1;GSS delegation too eager connection reuse;CVE-2023-27536;2023-03-20;2023-03-07;CWE-305: Authentication Bypass by Primary Weakness;480;CONNREUSE;-;lib;low;https://hackerone.com/reports/1895135
CVE-2023-27535.html;7.13.0;7.88.1;FTP too eager connection reuse;CVE-2023-27535;2023-03-20;2023-03-05;CWE-305: Authentication Bypass by Primary Weakness;2400;CONNREUSE;-;both;medium;https://hackerone.com/reports/1892780
CVE-2023-27534.html;7.18.0;7.88.1;SFTP path ~ resolving discrepancy;CVE-2023-27534;2023-03-20;2023-03-05;CWE-22: Improper Limitation of a Pathname to a Restricted Directory;480;SFTP;-;both;low;https://hackerone.com/reports/1892351
CVE-2023-27533.html;7.7;7.88.1;TELNET option IAC injection;CVE-2023-27533;2023-03-20;2023-03-03;CWE-75: Failure to Sanitize Special Elements into a Different Plane;480;TELNET;-;both;low;https://hackerone.com/reports/1891474
CVE-2023-23916.html;7.57.0;7.87.0;HTTP multi-header compression denial of service;CVE-2023-23916;2023-02-15;2023-01-08;CWE-770: Allocation of Resources Without Limits or Throttling;2400;compression;-;both;medium;https://hackerone.com/reports/1826048
CVE-2023-23915.html;7.77.0;7.87.0;HSTS amnesia with --parallel;CVE-2023-23915;2023-02-15;2022-12-21;CWE-319: Cleartext Transmission of Sensitive Information;480;HSTS;-;both;low;https://hackerone.com/reports/1814333
CVE-2023-23914.html;7.77.0;7.87.0;HSTS ignored on multiple requests;CVE-2023-23914;2023-02-15;2022-12-21;CWE-319: Cleartext Transmission of Sensitive Information;480;HSTS;-;both;low;https://hackerone.com/reports/1813864
CVE-2022-43552.html;7.16.0;7.86.0;HTTP Proxy deny use after free;CVE-2022-43552;2022-12-21;2022-11-07;CWE-416: Use After Free;0;proxy;USE_AFTER_FREE;both;low;https://hackerone.com/reports/1764858
CVE-2022-43551.html;7.77.0;7.86.0;Another HSTS bypass via IDN;CVE-2022-43551;2022-12-21;2022-10-29;CWE-319: Cleartext Transmission of Sensitive Information;2400;URL;-;both;medium;https://hackerone.com/reports/1755083
CVE-2022-42916.html;7.77.0;7.85.0;HSTS bypass via IDN;CVE-2022-42916;2022-10-26;2022-10-11;CWE-319: Cleartext Transmission of Sensitive Information;2400;URL;-;both;medium;https://hackerone.com/reports/1730660
CVE-2022-42915.html;7.77.0;7.85.0;HTTP proxy double free;CVE-2022-42915;2022-10-26;2022-10-04;CWE-415: Double Free;0;proxy;DOUBLE_FREE;both;medium;https://hackerone.com/reports/1722065
CVE-2022-35260.html;7.84.0;7.85.0;.netrc parser out-of-bounds access;CVE-2022-35260;2022-10-26;2022-10-04;CWE-121: Stack-based Buffer Overflow;480;NETRC;OVERFLOW;both;low;https://hackerone.com/reports/1721098
CVE-2022-32221.html;7.7;7.85.0;POST following PUT confusion;CVE-2022-32221;2022-10-26;2022-09-19;CWE-440: Expected Behavior Violation;2400;HTTP;-;lib;medium;https://hackerone.com/reports/1704017
CVE-2022-35252.html;4.9;7.84.0;control code in cookie denial of service;CVE-2022-35252;2022-08-31;2022-06-26;CWE-1286: Improper Validation of Syntactic Correctness of Input;480;cookies;-;both;low;https://hackerone.com/reports/1613943
CVE-2022-32208.html;7.16.4;7.83.1;FTP-KRB bad message verification;CVE-2022-32208;2022-06-27;2022-06-02;CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel;480;FTP;-;both;low;https://hackerone.com/reports/1590071
CVE-2022-32207.html;7.69.0;7.83.1;Non-preserved file permissions;CVE-2022-32207;2022-06-27;2022-05-17;CWE-281: Improper Preservation of Permissions;2400;filesystem;-;both;medium;https://hackerone.com/reports/1573634
CVE-2022-32206.html;7.57.0;7.83.1;HTTP compression denial of service;CVE-2022-32206;2022-06-27;2022-05-15;CWE-770: Allocation of Resources Without Limits or Throttling;2400;compression;-;both;medium;https://hackerone.com/reports/1570651
CVE-2022-32205.html;7.71.0;7.83.1;Set-Cookie denial of service;CVE-2022-32205;2022-06-27;2022-05-13;CWE-770: Allocation of Resources Without Limits or Throttling;480;cookies;-;both;low;https://hackerone.com/reports/1569946
CVE-2022-30115.html;7.82.0;7.83.0;HSTS bypass via trailing dot;CVE-2022-30115;2022-05-11;2022-05-03;CWE-319: Cleartext Transmission of Sensitive Information;2400;URL;-;both;medium;https://hackerone.com/reports/1557449
CVE-2022-27782.html;7.16.1;7.83.0;TLS and SSH connection too eager reuse;CVE-2022-27782;2022-05-11;2022-05-01;CWE-305: Authentication Bypass by Primary Weakness;2400;CONNREUSE;-;both;medium;https://hackerone.com/reports/1555796
CVE-2022-27781.html;7.34.0;7.83.0;CERTINFO never-ending busy-loop;CVE-2022-27781;2022-05-11;2022-04-30;CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop');0;TLS;-;lib;low;https://hackerone.com/reports/1555441
CVE-2022-27780.html;7.80.0;7.83.0;percent-encoded path separator in URL host;CVE-2022-27780;2022-05-11;2022-04-28;CWE-177: Improper Handling of URL Encoding;2400;URL;-;both;medium;https://hackerone.com/reports/1553841
CVE-2022-27779.html;7.82.0;7.83.0;cookie for trailing dot TLD;CVE-2022-27779;2022-05-11;2022-04-28;CWE-201: Information Exposure Through Sent Data;2400;COOKIE;-;both;medium;https://hackerone.com/reports/1553301
CVE-2022-27778.html;7.83.0;7.83.0;curl removes wrong file on error;CVE-2022-27778;2022-05-11;2022-04-28;CWE-706: Use of Incorrectly-Resolved Name or Reference;2400;FILE;-;tool;medium;https://hackerone.com/reports/1553598
CVE-2022-27776.html;4.9;7.82.0;Auth/cookie leak on redirect;CVE-2022-27776;2022-04-27;2022-04-21;CWE-522: Insufficiently Protected Credentials;480;HTTP;-;both;low;https://hackerone.com/reports/1547048
CVE-2022-27775.html;7.65.0;7.82.0;Bad local IPv6 connection reuse;CVE-2022-27775;2022-04-27;2022-04-21;CWE-200: Exposure of Sensitive Information to an Unauthorized Actor;480;CONNREUSE;-;both;low;https://hackerone.com/reports/1546268
CVE-2022-27774.html;4.9;7.82.0;Credential leak on redirect;CVE-2022-27774;2022-04-27;2022-04-18;CWE-522: Insufficiently Protected Credentials;2400;HTTP;-;both;medium;https://hackerone.com/reports/1543773
CVE-2022-22576.html;7.33.0;7.82.0;OAUTH2 bearer bypass in connection reuse;CVE-2022-22576;2022-04-27;2022-03-18;CWE-305: Authentication Bypass by Primary Weakness;2400;CONNREUSE;-;both;medium;https://hackerone.com/reports/1526328
CVE-2021-22947.html;7.20.0;7.78.0;STARTTLS protocol injection via MITM;CVE-2021-22947;2021-09-15;2021-09-07;CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data;1500;STARTTLS;-;both;medium;https://hackerone.com/reports/1334763
CVE-2021-22946.html;7.20.0;7.78.0;Protocol downgrade required TLS bypassed;CVE-2021-22946;2021-09-15;2021-09-08;CWE-325: Missing Cryptographic Step;1000;STARTTLS;-;both;medium;https://hackerone.com/reports/1334111
CVE-2021-22945.html;7.73.0;7.78.0;UAF and double free in MQTT sending;CVE-2021-22945;2021-09-15;2021-07-19;CWE-415: Double Free;1000;MQTT;DOUBLE_FREE;both;medium;https://hackerone.com/reports/1269242
CVE-2021-22926.html;7.33.0;7.77.0;CURLOPT_SSLCERT mix-up with Secure Transport;CVE-2021-22926;2021-07-21;2021-06-15;CWE-295: Improper Certificate Validation;1000;TLS;-;both;medium;https://hackerone.com/reports/1234760
CVE-2021-22925.html;7.7;7.77.0;TELNET stack contents disclosure again;CVE-2021-22925;2021-07-21;2021-06-11;CWE-457: Use of Uninitialized Variable;800;TELNET;UNINIT;both;medium;https://hackerone.com/reports/1223882
CVE-2021-22924.html;7.10.4;7.77.0;Bad connection reuse due to flawed path name checks;CVE-2021-22924;2021-07-21;2021-06-11;CWE-295: Improper Certificate Validation;1200;CONNREUSE;-;both;medium;https://hackerone.com/reports/1223565
CVE-2021-22923.html;7.27.0;7.77.0;Metalink download sends credentials;CVE-2021-22923;2021-07-21;2021-05-30;CWE-522: Insufficiently Protected Credentials;700;Metalink;-;tool;medium;https://hackerone.com/reports/1213181
CVE-2021-22922.html;7.27.0;7.77.0;Wrong content via Metalink not discarded;CVE-2021-22922;2021-07-21;2021-05-30;CWE-20: Improper Input Validation;700;Metalink;-;tool;medium;https://hackerone.com/reports/1213175
CVE-2021-22901.html;7.75.0;7.76.1;TLS session caching disaster;CVE-2021-22901;2021-05-26;2021-04-29;CWE-416: Use After Free;2000;TLS;USE_AFTER_FREE;both;high;https://hackerone.com/reports/1180380
CVE-2021-22898.html;7.7;7.76.1;TELNET stack contents disclosure;CVE-2021-22898;2021-05-26;2021-04-27;CWE-457: Use of Uninitialized Variable;1000;TELNET;UNINIT;both;medium;https://hackerone.com/reports/1176461
CVE-2021-22897.html;7.61.0;7.76.1;Schannel cipher selection surprise;CVE-2021-22897;2021-05-26;2021-04-23;CWE-488: Exposure of Data Element to Wrong Session;800;TLS;-;both;low;https://hackerone.com/reports/1172857
CVE-2021-22890.html;7.63.0;7.75.0;TLS 1.3 session ticket proxy host mix-up;CVE-2021-22890;2021-03-31;2021-03-17;CWE-290: Authentication Bypass by Spoofing;0;TLS;-;both;low;https://hackerone.com/reports/1129529
CVE-2021-22876.html;7.1.1;7.75.0;Automatic referer leaks credentials;CVE-2021-22876;2021-03-31;2021-02-12;CWE-359: Exposure of Private Personal Information to an Unauthorized Actor;800;HTTP;-;both;low;https://hackerone.com/reports/1101882
CVE-2020-8286.html;7.41.0;7.73.0;Inferior OCSP verification;CVE-2020-8286;2020-12-09;2020-12-02;CWE-299: Improper Check for Certificate Revocation;900;TLS;-;both;medium;https://hackerone.com/reports/1048457
CVE-2020-8285.html;7.21.0;7.73.0;FTP wildcard stack overflow;CVE-2020-8285;2020-12-09;2020-11-27;CWE-674: Uncontrolled Recursion;0;FTP;-;lib;medium;https://hackerone.com/reports/1045844
CVE-2020-8284.html;4.0;7.73.0;trusting FTP PASV responses;CVE-2020-8284;2020-12-09;2020-11-21;CWE-200: Exposure of Sensitive Information to an Unauthorized Actor;700;FTP;-;both;low;https://hackerone.com/reports/1040166
CVE-2020-8231.html;7.29.0;7.71.1;wrong connect-only connection;CVE-2020-8231;2020-08-19;2020-07-31;CWE-825: Expired Pointer Dereference;500;internal;-;lib;low;https://hackerone.com/reports/948876
CVE-2020-8177.html;7.20.0;7.70.0;curl overwrite local file with -J;CVE-2020-8177;2020-06-24;2020-05-30;CWE-641: Improper Restriction of Names for Files and Other Resources;700;tool;-;tool;medium;https://hackerone.com/reports/887462
CVE-2020-8169.html;7.62.0;7.70.0;Partial password leak over DNS on HTTP redirect;CVE-2020-8169;2020-06-24;2020-05-15;CWE-200: Exposure of Sensitive Information to an Unauthorized Actor;400;HTTP;-;both;medium;https://hackerone.com/reports/874778
CVE-2019-5481.html;7.52.0;7.65.3;FTP-KRB double free;CVE-2019-5481;2019-09-11;2019-09-03;CWE-415: Double Free;200;FTP;DOUBLE_FREE;both;medium;https://hackerone.com/reports/686823
CVE-2019-5482.html;7.19.4;7.65.3;TFTP small blocksize heap buffer overflow;CVE-2019-5482;2019-09-11;2019-08-29;CWE-122: Heap-based Buffer Overflow;250;TFTP;OVERFLOW;lib;medium;https://hackerone.com/reports/684603
CVE-2019-5443.html;7.44.0;7.65.1;Windows OpenSSL engine code injection;CVE-2019-5443;2019-06-24;2019-06-12;CWE-94: Improper Control of Generation of Code ('Code Injection');200;TLS;-;both;high;https://hackerone.com/reports/608577
CVE-2019-5436.html;7.19.4;7.64.1;TFTP receive buffer overflow;CVE-2019-5436;2019-05-22;2019-04-29;CWE-122: Heap-based Buffer Overflow;200;TFTP;OVERFLOW;both;low;https://hackerone.com/reports/550696
CVE-2019-5435.html;7.62.0;7.64.1;Integer overflows in URL parser;CVE-2019-5435;2019-05-22;2019-04-24;CWE-131: Incorrect Calculation of Buffer Size;150;URL;OVERFLOW;both;low;https://hackerone.com/reports/547630
CVE-2018-16890.html;7.36.0;7.63.0;NTLM type-2 out-of-bounds buffer read;CVE-2018-16890;2019-02-06;2018-12-30;CWE-125: Out-of-bounds Read;0;HTTP;OVERREAD;both;medium
CVE-2019-3822.html;7.36.0;7.63.0;NTLMv2 type-3 header stack buffer overflow;CVE-2019-3822;2019-02-06;2018-12-30;CWE-121: Stack-based Buffer Overflow;0;HTTP;OVERFLOW;both;high
CVE-2019-3823.html;7.34.0;7.63.0;SMTP end-of-response out-of-bounds read;CVE-2019-3823;2019-02-06;2019-01-18;CWE-125: Out-of-bounds Read;0;SMTP;OVERREAD;both;low
CVE-2018-16842.html;7.14.1;7.61.1;warning message out-of-buffer read;CVE-2018-16842;2018-10-31;2018-10-27;CWE-125: Out-of-bounds Read;100;tool;OVERREAD;tool;low
CVE-2018-16840.html;7.59.0;7.61.1;use after free in handle close;CVE-2018-16840;2018-10-31;2018-10-14;CWE-416: Use After Free;100;internal;USE_AFTER_FREE;both;low
CVE-2018-16839.html;7.33.0;7.61.1;SASL password overflow via integer overflow;CVE-2018-16839;2018-10-31;2018-09-06;CWE-131: Incorrect Calculation of Buffer Size;0;mail;USE_AFTER_FREE;both;low
CVE-2018-14618.html;7.15.4;7.61.0;NTLM password overflow via integer overflow;CVE-2018-14618;2018-09-05;2018-07-18;CWE-131: Incorrect Calculation of Buffer Size;0;HTTP;OVERFLOW;both;high
CVE-2018-0500.html;7.54.1;7.60.0;SMTP send heap buffer overflow;CVE-2018-0500;2018-07-11;2018-06-11;CWE-122: Heap-based Buffer Overflow;0;SMTP;OVERFLOW;both;high
CVE-2018-1000300.html;7.54.1;7.59.0;FTP shutdown response buffer overflow;CVE-2018-1000300;2018-05-16;2018-03-22;CWE-122: Heap-based Buffer Overflow;0;FTP;OVERFLOW;both;high
CVE-2018-1000301.html;7.20.0;7.59.0;RTSP bad headers buffer over-read;CVE-2018-1000301;2018-05-16;2018-03-24;CWE-126: Buffer Over-read;0;RTSP;OVERREAD;both;medium
CVE-2018-1000122.html;7.20.0;7.58.0;RTSP RTP buffer over-read;CVE-2018-1000122;2018-03-14;2018-02-20;CWE-126: Buffer Over-read;0;RTSP;OVERREAD;both;medium
CVE-2018-1000121.html;7.21.0;7.58.0;LDAP NULL pointer dereference;CVE-2018-1000121;2018-03-14;2018-03-06;CWE-476: NULL Pointer Dereference;0;LDAP;NULL_MISTAKE;both;low
CVE-2018-1000120.html;7.12.3;7.58.0;FTP path trickery leads to NIL byte out of bounds write;CVE-2018-1000120;2018-03-14;2018-01-29;CWE-122: Heap-based Buffer Overflow;0;FTP;OVERFLOW;both;high
CVE-2018-1000007.html;6.0;7.57.0;HTTP authentication leak in redirects;CVE-2018-1000007;2018-01-24;2018-01-18;CWE-522: Insufficiently Protected Credentials;0;HTTP;-;both;low
CVE-2018-1000005.html;7.49.0;7.57.0;HTTP/2 trailer out-of-bounds read;CVE-2018-1000005;2018-01-24;2018-01-10;CWE-126: Buffer Over-read;0;HTTP;OVERREAD;both;low
CVE-2017-8818.html;7.56.0;7.56.1;SSL out of buffer access;CVE-2017-8818;2017-11-29;2017-11-18;CWE-125: Out-of-bounds Read;0;TLS;OVERREAD;both;high
CVE-2017-8817.html;7.21.0;7.56.1;FTP wildcard out of bounds read;CVE-2017-8817;2017-11-29;2017-11-10;CWE-126: Buffer Over-read;0;FTP;OVERREAD;lib;medium
CVE-2017-8816.html;7.36.0;7.56.1;NTLM buffer overflow via integer overflow;CVE-2017-8816;2017-11-29;2017-11-06;CWE-131: Incorrect Calculation of Buffer Size;0;HTTP;OVERFLOW;both;medium
CVE-2017-1000257.html;7.20.0;7.56.0;IMAP FETCH response out of bounds read;CVE-2017-1000257;2017-10-12;2017-10-06;CWE-126: Buffer Over-read;0;IMAP;OVERREAD;both;medium
CVE-2017-1000254.html;7.7;7.55.1;FTP PWD response parser out of bounds read;CVE-2017-1000254;2017-10-04;2017-09-24;CWE-126: Buffer Over-read;0;FTP;OVERREAD;both;medium
CVE-2017-1000101.html;7.34.0;7.54.1;URL globbing out of bounds read;CVE-2017-1000101;2017-08-09;2017-06-14;CWE-126: Buffer Over-read;0;tool;OVERREAD;tool;medium
CVE-2017-1000100.html;7.15.0;7.54.1;TFTP sends more than buffer size;CVE-2017-1000100;2017-08-09;2017-07-11;CWE-126: Buffer Over-read;0;TFTP;OVERREAD;both;high
CVE-2017-1000099.html;7.54.1;7.54.1;FILE buffer read out of bounds;CVE-2017-1000099;2017-08-09;2017-07-15;CWE-170: Improper Null Termination;0;FILE;OVERREAD;both;medium
CVE-2017-9502.html;7.53.0;7.54.0;URL file scheme drive letter buffer overflow;CVE-2017-9502;2017-06-14;2017-06-04;CWE-122: Heap-based Buffer Overflow;0;URL;OVERFLOW;both;high
CVE-2017-7468.html;7.52.0;7.53.1;TLS session resumption client cert bypass (again);CVE-2017-7468;2017-04-19;2017-03-21;CWE-305: Authentication Bypass by Primary Weakness;0;TLS;-;both;high
CVE-2017-7407.html;6.5;7.53.1;--write-out out of buffer read;CVE-2017-7407;2017-04-03;2017-03-10;CWE-126: Buffer Over-read;0;tool;OVERREAD;tool;medium
CVE-2017-2629.html;7.52.0;7.52.1;SSL_VERIFYSTATUS ignored;CVE-2017-2629;2017-02-22;2017-01-12;CWE-304: Missing Critical Step in Authentication;0;TLS;-;both;medium
CVE-2016-9594.html;7.52.0;7.52.0;uninitialized random;CVE-2016-9594;2016-12-23;2016-12-21;CWE-330: Use of Insufficiently Random Values;0;internal;-;both;high
CVE-2016-9586.html;5.4;7.51.0;printf floating point buffer overflow;CVE-2016-9586;2016-12-21;2016-11-08;CWE-121: Stack-based Buffer Overflow;0;internal;OVERFLOW;lib;medium
CVE-2016-9952.html;7.27.0;7.51.0;Win CE Schannel cert wildcard matches too much;CVE-2016-9952;2016-12-21;2016-11-29;CWE-295: Improper Certificate Validation;0;TLS;-;both;medium
CVE-2016-9953.html;7.27.0;7.51.0;Win CE Schannel cert name out of buffer read;CVE-2016-9953;2016-12-21;2016-11-29;CWE-126: Buffer Over-read;0;TLS;OVERREAD;both;medium
CVE-2016-8615.html;4.9;7.50.3;cookie injection for other servers;CVE-2016-8615;2016-11-02;2016-09-23;CWE-187: Partial Comparison;0;HTTP;-;both;high
CVE-2016-8616.html;7.7;7.50.3;case insensitive password comparison;CVE-2016-8616;2016-11-02;2016-09-23;CWE-178: Improper Handling of Case Sensitivity;0;internal;-;both;medium
CVE-2016-8617.html;7.8.1;7.50.3;OOB write via unchecked multiplication;CVE-2016-8617;2016-11-02;2016-09-23;CWE-131: Incorrect Calculation of Buffer Size;0;internal;OVERFLOW;both;medium
CVE-2016-8618.html;5.4;7.50.3;double free in curl_maprintf;CVE-2016-8618;2016-11-02;2016-09-23;CWE-415: Double Free;0;internal;DOUBLE_FREE;lib;medium
CVE-2016-8619.html;7.3;7.50.3;double free in krb5 code;CVE-2016-8619;2016-11-02;2016-09-23;CWE-415: Double Free;0;FTP;DOUBLE_FREE;both;high
CVE-2016-8620.html;7.34.0;7.50.3;glob parser write/read out of bounds;CVE-2016-8620;2016-11-02;2016-10-02;CWE-122: Heap-based Buffer Overflow;0;tool;OVERREAD;tool;medium
CVE-2016-8621.html;7.12.2;7.50.3;curl_getdate read out of bounds;CVE-2016-8621;2016-11-02;2016-10-03;CWE-126: Buffer Over-read;0;internal;OVERREAD;both;medium
CVE-2016-8622.html;7.24.0;7.50.3;URL unescape heap overflow via integer truncation;CVE-2016-8622;2016-11-02;2016-09-23;CWE-122: Heap-based Buffer Overflow;0;internal;OVERFLOW;both;medium
CVE-2016-8623.html;7.10.7;7.50.3;Use after free via shared cookies;CVE-2016-8623;2016-11-02;2016-09-23;CWE-416: Use After Free;0;HTTP;USE_AFTER_FREE;lib;high
CVE-2016-8624.html;6.0;7.50.3;invalid URL parsing with '#';CVE-2016-8624;2016-11-02;2016-10-10;CWE-172: Encoding Error;0;URL;-;both;medium
CVE-2016-8625.html;7.12.0;7.50.3;IDNA 2003 makes curl use wrong host;CVE-2016-8625;2016-11-02;2016-10-11;CWE-838: Inappropriate Encoding for Output Context;0;URL;-;both;high
CVE-2016-7167.html;7.11.1;7.50.2;curl escape and unescape integer overflows;CVE-2016-7167;2016-09-14;2016-09-08;CWE-131: Incorrect Calculation of Buffer Size;0;internal;OVERFLOW;lib;medium
CVE-2016-7141.html;7.19.6;7.50.1;Incorrect reuse of client certificates;CVE-2016-7141;2016-09-07;2016-08-22;CWE-305: Authentication Bypass by Primary Weakness;0;TLS;-;both;high
CVE-2016-5419.html;5.0;7.50.0;TLS session resumption client cert bypass;CVE-2016-5419;2016-08-03;2016-04-15;CWE-305: Authentication Bypass by Primary Weakness;0;TLS;-;both;high
CVE-2016-5420.html;7.7;7.50.0;Reusing connections with wrong client cert;CVE-2016-5420;2016-08-03;2016-06-15;CWE-305: Authentication Bypass by Primary Weakness;0;TLS;-;both;medium
CVE-2016-5421.html;7.32.0;7.50.0;use of connection struct after free;CVE-2016-5421;2016-08-03;2016-07-03;CWE-416: Use After Free;0;internal;USE_AFTER_FREE;lib;high
CVE-2016-4802.html;7.11.1;7.49.0;Windows DLL hijacking;CVE-2016-4802;2016-05-30;2016-05-07;CWE-94: Improper Control of Generation of Code ('Code Injection');0;build;-;both;high
CVE-2016-3739.html;7.21.0;7.48.0;TLS certificate check bypass with mbedTLS/PolarSSL;CVE-2016-3739;2016-05-18;2016-04-21;CWE-297: Improper Validation of Certificate with Host Mismatch;0;TLS;-;both;high
CVE-2016-0754.html;4.0;7.46.0;remote filename path traversal in curl tool for Windows;CVE-2016-0754;2016-01-27;2015-11-30;CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal');0;tool;-;tool;high
CVE-2016-0755.html;7.10.7;7.46.0;NTLM credentials not-checked for proxy connection reuse;CVE-2016-0755;2016-01-27;2016-01-13;CWE-305: Authentication Bypass by Primary Weakness;0;CONNREUSE;-;both;medium
CVE-2015-3237.html;7.40.0;7.42.1;SMB send off unrelated memory contents;CVE-2015-3237;2015-06-17;2015-05-22;CWE-126: Buffer Over-read;0;SMB;OVERREAD;both;high
CVE-2015-3236.html;7.40.0;7.42.1;lingering HTTP credentials in connection reuse;CVE-2015-3236;2015-06-17;2015-05-19;CWE-305: Authentication Bypass by Primary Weakness;0;CONNREUSE;-;both;high
CVE-2015-3153.html;4.0;7.42.0;sensitive HTTP server headers also sent to proxies;CVE-2015-3153;2015-04-29;2015-03-12;CWE-201: Information Exposure Through Sent Data;0;HTTP;-;both;high
CVE-2015-3144.html;7.37.0;7.41.0;hostname out of boundary memory access;CVE-2015-3144;2015-04-22;2015-04-16;CWE-124: Buffer Underwrite ('Buffer Underflow');0;internal;OVERREAD;both;medium
CVE-2015-3145.html;7.31.0;7.41.0;cookie parser out of boundary memory access;CVE-2015-3145;2015-04-22;2015-04-16;CWE-124: Buffer Underwrite ('Buffer Underflow');0;HTTP;OVERREAD;both;medium
CVE-2015-3148.html;7.10.6;7.41.0;Negotiate not treated as connection-oriented;CVE-2015-3148;2015-04-22;2015-03-31;CWE-305: Authentication Bypass by Primary Weakness;0;HTTP;-;both;medium
CVE-2015-3143.html;7.10.6;7.41.0;Reusing authenticated connection when unauthenticated;CVE-2015-3143;2015-04-22;2015-02-24;CWE-305: Authentication Bypass by Primary Weakness;0;internal;-;both;medium
CVE-2014-8151.html;7.31.0;7.39.0;Secure Transport certificate check bypass;CVE-2014-8151;2015-01-08;2014-11-26;CWE-297: Improper Validation of Certificate with Host Mismatch;0;TLS;-;both;medium
CVE-2014-8150.html;6.0;7.39.0;URL request injection;CVE-2014-8150;2015-01-08;2014-12-25;CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling');0;URL;-;both;high
CVE-2014-3707.html;7.17.1;7.38.0;duphandle read out of bounds;CVE-2014-3707;2014-11-05;2014-09-16;CWE-126: Buffer Over-read;0;internal;OVERREAD;lib;medium
CVE-2014-3620.html;7.31.0;7.37.1;cookie leak for TLDs;CVE-2014-3620;2014-09-10;2014-08-15;CWE-201: Information Exposure Through Sent Data;0;HTTP;-;both;high
CVE-2014-3613.html;4.0;7.37.1;cookie leak with IP address as domain;CVE-2014-3613;2014-09-10;2014-08-15;CWE-201: Information Exposure Through Sent Data;0;HTTP;-;both;medium
CVE-2014-2522.html;7.27.0;7.35.0;not verifying certs for TLS to IP address / Schannel;CVE-2014-2522;2014-03-26;2014-02-27;CWE-297: Improper Validation of Certificate with Host Mismatch;0;TLS;-;both;medium
CVE-2014-1263.html;7.27.0;7.35.0;not verifying certs for TLS to IP address / Secure Transport;CVE-2014-1263;2014-03-26;2014-02-27;CWE-297: Improper Validation of Certificate with Host Mismatch;0;TLS;-;both;medium
CVE-2014-0139.html;7.10.3;7.35.0;IP address wildcard certificate validation;CVE-2014-0139;2014-03-26;2014-02-22;CWE-297: Improper Validation of Certificate with Host Mismatch;0;TLS;-;both;medium
CVE-2014-0138.html;7.10.6;7.35.0;wrong reuse of connections;CVE-2014-0138;2014-03-26;2014-02-15;CWE-305: Authentication Bypass by Primary Weakness;0;CONNREUSE;-;both;medium
CVE-2014-0015.html;7.10.6;7.34.0;reuse of wrong HTTP NTLM connection;CVE-2014-0015;2014-01-29;2014-01-07;CWE-305: Authentication Bypass by Primary Weakness;0;CONNREUSE;-;both;medium
CVE-2013-6422.html;7.21.4;7.33.0;cert name check ignore with GnuTLS;CVE-2013-6422;2013-12-17;2013-11-29;CWE-297: Improper Validation of Certificate with Host Mismatch;0;TLS;-;lib;medium
CVE-2013-4545.html;7.18.0;7.32.0;cert name check ignore OpenSSL;CVE-2013-4545;2013-11-15;2013-11-06;CWE-297: Improper Validation of Certificate with Host Mismatch;0;TLS;-;lib;medium
CVE-2013-2174.html;7.7;7.30.0;URL decode buffer boundary flaw;CVE-2013-2174;2013-06-22;2013-05-19;CWE-126: Buffer Over-read;0;URL;OVERREAD;lib;high
CVE-2013-1944.html;4.7;7.29.0;cookie domain tailmatch;CVE-2013-1944;2013-04-12;2013-04-09;CWE-201: Information Exposure Through Sent Data;0;HTTP;-;both;high
CVE-2013-0249.html;7.26.0;7.28.1;SASL buffer overflow;CVE-2013-0249;2013-02-06;2013-01-30;CWE-121: Stack-based Buffer Overflow;0;mail;OVERFLOW;both;critical
CVE-2011-3389.html;7.10.6;7.23.1;SSL CBC IV vulnerability;CVE-2011-3389;2012-01-24;2012-01-19;CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel;0;TLS;-;both;high
CVE-2012-0036.html;7.20.0;7.23.1;URL sanitization vulnerability;CVE-2012-0036;2012-01-24;2011-12-22;CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection');0;URL;-;both;high
CVE-2011-2192.html;7.10.6;7.21.6;inappropriate GSSAPI delegation;CVE-2011-2192;2011-06-23;2011-06-06;CWE-281: Improper Preservation of Permissions;0;auth;-;both;medium
CVE-2010-3842.html;7.20.0;7.21.1;local file overwrite;CVE-2010-3842;2010-10-13;2010-09-03;CWE-30: Path Traversal;0;tool;-;tool;high
CVE-2010-0734.html;7.10.5;7.19.7;data callback excessive length;CVE-2010-0734;2010-02-09;2010-01-09;CWE-628: Function Call with Incorrectly Specified Arguments;0;internal;-;lib;high
CVE-2009-2417.html;7.4;7.19.5;embedded zero in cert name;CVE-2009-2417;2009-08-12;2009-07-30;CWE-170: Improper Null Termination;0;TLS;NULL_MISTAKE;both;high
CVE-2009-0037.html;5.11;7.19.3;Arbitrary File Access;CVE-2009-0037;2009-03-03;2009-02-06;CWE-142: Improper Neutralization of Value Delimiters;0;HTTP;-;both;medium
CVE-2007-3564.html;7.14.0;7.16.3;GnuTLS insufficient cert verification;CVE-2007-3564;2007-07-10;2007-06-27;CWE-298: Improper Validation of Certificate Expiration;0;TLS;-;both;low
CVE-2006-1061.html;7.15.0;7.15.2;TFTP Packet Buffer Overflow;CVE-2006-1061;2006-03-20;2006-03-10;CWE-122: Heap-based Buffer Overflow;0;TFTP;OVERFLOW;both;high
CVE-2005-4077.html;7.11.2;7.15.0;URL Buffer Overflow;CVE-2005-4077;2005-12-07;2005-11-29;CWE-122: Heap-based Buffer Overflow;0;URL;OVERFLOW;both;high
CVE-2005-3185.html;7.10.6;7.14.1;NTLM Buffer Overflow;CVE-2005-3185;2005-10-13;2005-10-12;CWE-121: Stack-based Buffer Overflow;0;HTTP;OVERFLOW;both;high
CVE-2005-0490.html;7.3;7.13.0;Authentication Buffer Overflows;CVE-2005-0490;2005-02-21;;CWE-121: Stack-based Buffer Overflow;0;auth;OVERFLOW;both;high
CVE-2003-1605.html;4.5;7.10.6;Proxy Authentication Header Information Leakage;CVE-2003-1605;2003-08-03;;CWE-201: Information Exposure Through Sent Data;0;HTTP;-;both;high
CVE-2000-0973.html;6.0;7.4;FTP Server Response Buffer Overflow;CVE-2000-0973;2000-10-13;;CWE-121: Stack-based Buffer Overflow;0;FTP;OVERFLOW;both;critical