CVE-2022-35260
- EPSS 0.16%
- Published 05.12.2022 22:15:10
- Last modified 21.11.2024 07:10:59
curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte b...
CVE-2022-42915
- EPSS 0.42%
- Published 29.10.2022 20:15:09
- Last modified 07.05.2025 14:15:33
curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol thro...
CVE-2022-42916
- EPSS 0.05%
- Published 29.10.2022 02:15:09
- Last modified 21.11.2024 07:25:35
In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL....
CVE-2022-35252
- EPSS 0.08%
- Published 23.09.2022 14:15:12
- Last modified 05.05.2025 17:18:16
When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service...
CVE-2022-32205
- EPSS 1.4%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:12
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...
CVE-2022-32206
- EPSS 2.57%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:13
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...
CVE-2022-32207
- EPSS 0.17%
- Published 07.07.2022 13:15:08
- Last modified 23.04.2025 18:15:53
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...
CVE-2022-32208
- EPSS 0.3%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:13
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
CVE-2022-30115
- EPSS 0.06%
- Published 02.06.2022 14:15:51
- Last modified 21.11.2024 07:02:11
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while no...
CVE-2022-27779
- EPSS 0.19%
- Published 02.06.2022 14:15:44
- Last modified 21.11.2024 06:56:10
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://public...