CVE-2012-6070

Falconpl before 0.9.6.9-git20120606 misuses the libcurl API which may allow remote attackers to interfere with security checks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:falconpl:falconpl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2012/12/27/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2012/12/27/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2013/01/15/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2013/01/15/6 - Mailing List, Third Party Advisory
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696681 - Issue Tracking, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696681 - Issue Tracking, Third Party Advisory
References () https://security-tracker.debian.org/tracker/CVE-2012-6070 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2012-6070 - Third Party Advisory

Information

Published : 2019-11-19 17:15

Updated : 2024-11-21 01:45


NVD link : CVE-2012-6070

Mitre link : CVE-2012-6070

CVE.ORG link : CVE-2012-6070


JSON object : View

Products Affected

falconpl

  • falconpl
CWE
CWE-20

Improper Input Validation