Haxx

Curl

130 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 08.01.2026 10:15:47
  • Zuletzt bearbeitet 20.01.2026 14:50:24

When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hos...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 08.01.2026 10:15:47
  • Zuletzt bearbeitet 20.01.2026 14:47:52

When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 08.01.2026 10:15:46
  • Zuletzt bearbeitet 20.01.2026 14:53:11

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

  • EPSS 0.04%
  • Veröffentlicht 08.01.2026 10:15:46
  • Zuletzt bearbeitet 20.01.2026 14:51:26

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the us...

  • EPSS 0.01%
  • Veröffentlicht 08.01.2026 10:15:45
  • Zuletzt bearbeitet 27.01.2026 21:29:39

When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing TLS options in one thread would inadvertently change them globally and therefore possibly also affect other concurrently setup transfers. Disabling certificate verifica...

  • EPSS 0.02%
  • Veröffentlicht 08.01.2026 10:00:25
  • Zuletzt bearbeitet 20.01.2026 14:54:02

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl al...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 07.11.2025 07:26:30
  • Zuletzt bearbeitet 20.01.2026 14:57:03

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

  • EPSS 0.1%
  • Veröffentlicht 12.09.2025 05:10:37
  • Zuletzt bearbeitet 20.01.2026 14:55:47

curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a m...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 12.09.2025 05:10:03
  • Zuletzt bearbeitet 20.01.2026 14:58:01

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - ...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 07.06.2025 07:49:09
  • Zuletzt bearbeitet 30.07.2025 19:41:33

Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop. There is no other way for the application to escape or exit this loop other than killing...