Haxx

Curl

142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.05.2026 08:29:08
  • Zuletzt bearbeitet 14.05.2026 14:12:48

Successfully using libcurl to do a transfer over a specific HTTP proxy (`proxyA`) with **Digest** authentication and then changing the proxy host to a second one (`proxyB`) for a second transfer, reusing the same handle, makes libcurl wrongly pass on...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 13.05.2026 08:28:53
  • Zuletzt bearbeitet 14.05.2026 14:17:05

When curl is told to use the Certificate Status Request TLS extension, often referred to as *OCSP stapling*, to verify that the server certificate is valid, it fails to detect OCSP problems and instead wrongly consider the response as fine.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 13.05.2026 08:28:36
  • Zuletzt bearbeitet 14.05.2026 14:18:02

When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, libcurl could leak the password used for the first host to the followed-to host under certain circumstances.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 13.05.2026 08:28:19
  • Zuletzt bearbeitet 14.05.2026 14:21:06

Using libcurl, when a custom `Host:` header is first set for an HTTP request and a second request is subsequently done using the same *easy handle* but without the custom `Host:` header set, the second request would use stale information and pass on ...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.05.2026 08:28:03
  • Zuletzt bearbeitet 14.05.2026 13:40:53

curl might erroneously pass on credentials for a first proxy to a second proxy. This can happen when the following conditions are true: 1. curl is setup to use specific different proxies for different URL schemes 2. the first proxy needs credential...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 13.05.2026 08:27:42
  • Zuletzt bearbeitet 13.05.2026 19:13:14

libcurl might in some circumstances reuse the wrong connection for SMB(S) transfers. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.05.2026 08:27:26
  • Zuletzt bearbeitet 13.05.2026 19:31:07

libcurl might in some circumstances reuse the wrong connection when asked to do an authenticated HTTP(S) request after a Negotiate-authenticated one, when both use the same host. libcurl features a pool of recent connections so that subsequent reque...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 13.05.2026 08:27:04
  • Zuletzt bearbeitet 14.05.2026 13:45:11

A vulnerability exists where a connection requiring TLS incorrectly reuses an existing unencrypted connection from the same connection pool. If an initial transfer is made in clear-text (via IMAP, SMTP, or POP3), a subsequent request to that same hos...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 11.03.2026 10:09:37
  • Zuletzt bearbeitet 12.03.2026 14:08:56

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 11.03.2026 10:09:21
  • Zuletzt bearbeitet 12.03.2026 14:09:50

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.