Haxx

Curl

121 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.34%
  • Published 18.11.2014 15:59:00
  • Last modified 12.04.2025 10:46:40

cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a s...

  • EPSS 0.29%
  • Published 18.04.2014 22:14:38
  • Last modified 12.04.2025 10:46:40

curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certifica...

  • EPSS 1.27%
  • Published 15.04.2014 14:55:04
  • Last modified 12.04.2025 10:46:40

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connec...

  • EPSS 1.2%
  • Published 15.04.2014 14:55:04
  • Last modified 12.04.2025 10:46:40

cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to sp...

  • EPSS 2.58%
  • Published 02.02.2014 00:55:05
  • Last modified 11.04.2025 00:51:21

cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.

  • EPSS 0.67%
  • Published 23.11.2013 11:55:04
  • Last modified 11.04.2025 00:51:21

cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-th...

Exploit
  • EPSS 9.13%
  • Published 31.07.2013 13:20:25
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string endi...

  • EPSS 2.48%
  • Published 29.04.2013 22:55:08
  • Last modified 11.04.2025 00:51:21

The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.

Exploit
  • EPSS 38.79%
  • Published 08.03.2013 22:55:01
  • Last modified 11.04.2025 00:51:21

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash...

  • EPSS 4.51%
  • Published 06.09.2011 19:55:03
  • Last modified 11.04.2025 00:51:21

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man...