CVE-2024-2379
- EPSS 0.21%
- Published 27.03.2024 08:15:41
- Last modified 30.07.2025 19:42:09
libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any ...
CVE-2024-2004
- EPSS 0.91%
- Published 27.03.2024 08:15:41
- Last modified 30.07.2025 19:42:14
When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to c...
CVE-2022-45061
- EPSS 0.08%
- Published 09.11.2022 07:15:09
- Last modified 01.05.2025 15:15:58
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead t...
CVE-2022-35252
- EPSS 0.08%
- Published 23.09.2022 14:15:12
- Last modified 05.05.2025 17:18:16
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service...
CVE-2022-32208
- EPSS 0.3%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:13
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
CVE-2022-32207
- EPSS 0.17%
- Published 07.07.2022 13:15:08
- Last modified 23.04.2025 18:15:53
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...
CVE-2022-32206
- EPSS 2.57%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:13
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...
- EPSS 25.23%
- Published 21.06.2022 15:15:09
- Last modified 15.09.2025 14:15:33
In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...
CVE-2022-22576
- EPSS 0.27%
- Published 26.05.2022 17:15:09
- Last modified 21.11.2024 06:47:03
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for th...
CVE-2022-1678
- EPSS 0.52%
- Published 25.05.2022 15:15:07
- Last modified 21.11.2024 06:41:14
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.