CVE-2026-7168
- EPSS 0.05%
- Veröffentlicht 13.05.2026 08:29:08
- Zuletzt bearbeitet 14.05.2026 14:12:48
Successfully using libcurl to do a transfer over a specific HTTP proxy (`proxyA`) with **Digest** authentication and then changing the proxy host to a second one (`proxyB`) for a second transfer, reusing the same handle, makes libcurl wrongly pass on...
CVE-2026-7009
- EPSS 0.02%
- Veröffentlicht 13.05.2026 08:28:53
- Zuletzt bearbeitet 14.05.2026 14:17:05
When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.
CVE-2026-6429
- EPSS 0.03%
- Veröffentlicht 13.05.2026 08:28:36
- Zuletzt bearbeitet 14.05.2026 14:18:02
When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, libcurl could leak the password used for the first host to the followed-to host under certain circumstances.
CVE-2026-6276
- EPSS 0.02%
- Veröffentlicht 13.05.2026 08:28:19
- Zuletzt bearbeitet 14.05.2026 14:21:06
Using libcurl, when a custom `Host:` header is first set for an HTTP request and a second request is subsequently done using the same *easy handle* but without the custom `Host:` header set, the second request would use stale information and pass on ...
CVE-2026-6253
- EPSS 0.04%
- Veröffentlicht 13.05.2026 08:28:03
- Zuletzt bearbeitet 14.05.2026 13:40:53
curl might erroneously pass on credentials for a first proxy to a second proxy. This can happen when the following conditions are true: 1. curl is setup to use specific different proxies for different URL schemes 2. the first proxy needs credential...
CVE-2026-5773
- EPSS 0.03%
- Veröffentlicht 13.05.2026 08:27:42
- Zuletzt bearbeitet 13.05.2026 19:13:14
libcurl might in some circumstances reuse the wrong connection for SMB(S) transfers. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of ...
CVE-2026-5545
- EPSS 0.05%
- Veröffentlicht 13.05.2026 08:27:26
- Zuletzt bearbeitet 13.05.2026 19:31:07
libcurl might in some circumstances reuse the wrong connection when asked to do an authenticated HTTP(S) request after a Negotiate-authenticated one, when both use the same host. libcurl features a pool of recent connections so that subsequent reque...
CVE-2026-4873
- EPSS 0.02%
- Veröffentlicht 13.05.2026 08:27:04
- Zuletzt bearbeitet 14.05.2026 13:45:11
A vulnerability exists where a connection requiring TLS incorrectly reuses an existing unencrypted connection from the same connection pool. If an initial transfer is made in clear-text (via IMAP, SMTP, or POP3), a subsequent request to that same hos...
CVE-2026-3805
- EPSS 0.03%
- Veröffentlicht 11.03.2026 10:09:37
- Zuletzt bearbeitet 12.03.2026 14:08:56
When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.
CVE-2026-3784
- EPSS 0.02%
- Veröffentlicht 11.03.2026 10:09:21
- Zuletzt bearbeitet 12.03.2026 14:09:50
curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.