Haxx

Curl

134 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.01%
  • Veröffentlicht 24.04.2015 14:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via...

  • EPSS 3.48%
  • Veröffentlicht 24.04.2015 14:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.

  • EPSS 1.31%
  • Veröffentlicht 18.11.2014 15:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.

  • EPSS 1.82%
  • Veröffentlicht 18.11.2014 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a s...

  • EPSS 0.29%
  • Veröffentlicht 18.04.2014 22:14:38
  • Zuletzt bearbeitet 12.04.2025 10:46:40

curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certifica...

  • EPSS 0.68%
  • Veröffentlicht 15.04.2014 14:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connec...

  • EPSS 1.2%
  • Veröffentlicht 15.04.2014 14:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to sp...

  • EPSS 1.94%
  • Veröffentlicht 02.02.2014 00:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.

  • EPSS 0.35%
  • Veröffentlicht 23.11.2013 11:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-th...

Exploit
  • EPSS 3.18%
  • Veröffentlicht 31.07.2013 13:20:25
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string endi...