Haxx

Curl

121 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.21%
  • Veröffentlicht 27.03.2024 08:15:41
  • Zuletzt bearbeitet 30.07.2025 19:42:09

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any ...

Exploit
  • EPSS 1.96%
  • Veröffentlicht 27.03.2024 08:15:41
  • Zuletzt bearbeitet 30.07.2025 19:42:27

When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 27.03.2024 08:15:41
  • Zuletzt bearbeitet 30.07.2025 19:42:21

libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address,...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 03.02.2024 14:15:50
  • Zuletzt bearbeitet 21.11.2024 08:47:30

curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipp...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 12.12.2023 02:15:06
  • Zuletzt bearbeitet 13.02.2025 18:15:34

When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.

Exploit
  • EPSS 0.43%
  • Veröffentlicht 07.12.2023 01:15:07
  • Zuletzt bearbeitet 30.06.2025 17:15:29

This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites ...

Exploit
  • EPSS 14.47%
  • Veröffentlicht 15.09.2023 04:15:10
  • Zuletzt bearbeitet 21.11.2024 08:12:43

When curl retrieves an HTTP response, it stores the incoming headers so that they can be accessed later via the libcurl headers API. However, curl did not have a limit in how many or how large headers it would accept in a response, allowing a malici...

  • EPSS 0.02%
  • Veröffentlicht 22.08.2023 19:16:06
  • Zuletzt bearbeitet 21.11.2024 05:09:29

Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associa...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 26.05.2023 21:15:16
  • Zuletzt bearbeitet 15.01.2025 16:15:26

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function...

Exploit
  • EPSS 0.5%
  • Veröffentlicht 26.05.2023 21:15:16
  • Zuletzt bearbeitet 21.11.2024 07:54:50

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if ...