Metrics
Affected Vendors & Products
Thu, 20 Feb 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:8 |
Wed, 19 Feb 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Thu, 13 Feb 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 31 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 24 Jan 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sun, 15 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 12 Dec 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 11 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 11 Dec 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 11 Dec 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password. | |
Title | netrc and redirect credential leak | |
References |
|

Status: PUBLISHED
Assigner: curl
Published:
Updated: 2025-01-31T15:02:42.742Z
Reserved: 2024-11-09T18:41:55.703Z
Link: CVE-2024-11053

Updated: 2025-01-31T15:02:42.742Z

Status : Awaiting Analysis
Published: 2024-12-11T08:15:05.307
Modified: 2025-01-31T15:15:12.400
Link: CVE-2024-11053
