CVE-2025-10966
- EPSS 0.02%
- Veröffentlicht 07.11.2025 07:26:30
- Zuletzt bearbeitet 12.11.2025 16:20:22
curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.
CVE-2025-10148
- EPSS 0.07%
- Veröffentlicht 12.09.2025 05:10:37
- Zuletzt bearbeitet 18.11.2025 20:15:45
curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a m...
CVE-2025-9086
- EPSS 0.1%
- Veröffentlicht 12.09.2025 05:10:03
- Zuletzt bearbeitet 04.11.2025 22:16:45
1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but w...
CVE-2025-5399
- EPSS 0.06%
- Veröffentlicht 07.06.2025 07:49:09
- Zuletzt bearbeitet 30.07.2025 19:41:33
Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop. There is no other way for the application to escape or exit this loop other than killing...
CVE-2025-5025
- EPSS 0.02%
- Veröffentlicht 28.05.2025 06:29:51
- Zuletzt bearbeitet 30.07.2025 19:41:37
libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfS...
CVE-2025-4947
- EPSS 0.02%
- Veröffentlicht 28.05.2025 06:29:34
- Zuletzt bearbeitet 26.06.2025 15:08:21
libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
CVE-2025-0725
- EPSS 0.9%
- Veröffentlicht 05.02.2025 10:15:22
- Zuletzt bearbeitet 27.06.2025 19:24:08
When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer ov...
CVE-2025-0665
- EPSS 14.02%
- Veröffentlicht 05.02.2025 10:15:22
- Zuletzt bearbeitet 30.07.2025 19:41:22
libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.
CVE-2025-0167
- EPSS 0.16%
- Veröffentlicht 05.02.2025 10:15:22
- Zuletzt bearbeitet 30.07.2025 19:41:45
When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `de...
CVE-2024-11053
- EPSS 0.34%
- Veröffentlicht 11.12.2024 08:15:05
- Zuletzt bearbeitet 03.11.2025 21:16:04
When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an e...