296,720
Total vulnerabilities in the database
curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
| Software | From | Fixed in |
|---|---|---|
| haxx / curl | 7.20.0 | 7.70.0.x |
| debian / debian_linux | 10.0 | 10.0.x |
| fujitsu / m10-1_firmware | - | xcp2410 |
| fujitsu / m10-4_firmware | - | xcp2410 |
| fujitsu / m10-4s_firmware | - | xcp2410 |
| fujitsu / m12-1_firmware | - | xcp2410 |
| fujitsu / m12-2_firmware | - | xcp2410 |
| fujitsu / m12-2s_firmware | - | xcp2410 |
| fujitsu / m10-1_firmware | - | xcp3110 |
| fujitsu / m10-4_firmware | - | xcp3110 |
| fujitsu / m10-4s_firmware | - | xcp3110 |
| fujitsu / m12-1_firmware | - | xcp3110 |
| fujitsu / m12-2_firmware | - | xcp3110 |
| fujitsu / m12-2s_firmware | - | xcp3110 |
| siemens / sinec_infrastructure_network_services | - | 1.0.1.1 |
| splunk / universal_forwarder | 9.1.0 | 9.1.0.x |
| splunk / universal_forwarder | 9.0.0 | 9.0.6 |
| splunk / universal_forwarder | 8.2.0 | 8.2.12 |