CVE-2024-2379
- EPSS 0.21%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:09
libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any ...
CVE-2024-2004
- EPSS 0.91%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:14
When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to c...
CVE-2022-45061
- EPSS 0.08%
- Veröffentlicht 09.11.2022 07:15:09
- Zuletzt bearbeitet 01.05.2025 15:15:58
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead t...
CVE-2022-35252
- EPSS 0.08%
- Veröffentlicht 23.09.2022 14:15:12
- Zuletzt bearbeitet 05.05.2025 17:18:16
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service...
CVE-2022-32208
- EPSS 0.3%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:13
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
CVE-2022-32207
- EPSS 0.17%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 23.04.2025 18:15:53
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...
CVE-2022-32206
- EPSS 2.57%
- Veröffentlicht 07.07.2022 13:15:08
- Zuletzt bearbeitet 05.05.2025 17:18:13
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...
- EPSS 25.23%
- Veröffentlicht 21.06.2022 15:15:09
- Zuletzt bearbeitet 15.09.2025 14:15:33
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...
CVE-2022-22576
- EPSS 0.27%
- Veröffentlicht 26.05.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 06:47:03
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for th...
CVE-2022-1678
- EPSS 0.52%
- Veröffentlicht 25.05.2022 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:41:14
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.