Curl

Curl

19 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 07.11.2025 07:26:30
  • Zuletzt bearbeitet 12.11.2025 16:20:22

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

  • EPSS 0.07%
  • Veröffentlicht 12.09.2025 05:10:37
  • Zuletzt bearbeitet 18.11.2025 20:15:45

curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a m...

  • EPSS 0.1%
  • Veröffentlicht 12.09.2025 05:10:03
  • Zuletzt bearbeitet 04.11.2025 22:16:45

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but w...

Exploit
  • EPSS 0.06%
  • Veröffentlicht 07.06.2025 07:49:09
  • Zuletzt bearbeitet 30.07.2025 19:41:33

Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop. There is no other way for the application to escape or exit this loop other than killing...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 28.05.2025 06:29:51
  • Zuletzt bearbeitet 30.07.2025 19:41:37

libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfS...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 28.05.2025 06:29:34
  • Zuletzt bearbeitet 26.06.2025 15:08:21

libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.

Exploit
  • EPSS 0.9%
  • Veröffentlicht 05.02.2025 10:15:22
  • Zuletzt bearbeitet 27.06.2025 19:24:08

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer ov...

Exploit
  • EPSS 14.02%
  • Veröffentlicht 05.02.2025 10:15:22
  • Zuletzt bearbeitet 30.07.2025 19:41:22

libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.

Exploit
  • EPSS 0.16%
  • Veröffentlicht 05.02.2025 10:15:22
  • Zuletzt bearbeitet 30.07.2025 19:41:45

When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `de...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 11.12.2024 08:15:05
  • Zuletzt bearbeitet 03.11.2025 21:16:04

When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an e...