CVE-2024-8096
- EPSS 0.41%
- Veröffentlicht 11.09.2024 10:15:02
- Zuletzt bearbeitet 30.07.2025 19:42:16
When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. ...
CVE-2024-2466
- EPSS 0.15%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:21
libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address,...
CVE-2024-2398
- EPSS 1.96%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:27
When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all...
CVE-2024-2379
- EPSS 0.21%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:09
libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any ...
CVE-2024-2004
- EPSS 0.84%
- Veröffentlicht 27.03.2024 08:15:41
- Zuletzt bearbeitet 30.07.2025 19:42:14
When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to c...
CVE-2012-0036
- EPSS 6.54%
- Veröffentlicht 13.04.2012 20:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
curl and libcurl 7.2x before 7.24.0 do not properly consider special characters during extraction of a pathname from a URL, which allows remote attackers to conduct data-injection attacks via a crafted URL, as demonstrated by a CRLF injection attack ...
CVE-2010-3842
- EPSS 0.9%
- Veröffentlicht 28.10.2010 00:00:05
- Zuletzt bearbeitet 11.04.2025 00:51:21
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the ...
CVE-2009-0037
- EPSS 3.37%
- Veröffentlicht 05.03.2009 02:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or o...
CVE-2005-3185
- EPSS 4.85%
- Veröffentlicht 13.10.2005 22:02:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary co...