Haxx

Curl

142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.31%
  • Veröffentlicht 18.11.2014 15:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.

  • EPSS 1.82%
  • Veröffentlicht 18.11.2014 15:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a s...

  • EPSS 0.25%
  • Veröffentlicht 18.04.2014 22:14:38
  • Zuletzt bearbeitet 06.05.2026 22:30:45

curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certifica...

  • EPSS 0.92%
  • Veröffentlicht 15.04.2014 14:55:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connec...

  • EPSS 1.63%
  • Veröffentlicht 15.04.2014 14:55:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to sp...

  • EPSS 1.27%
  • Veröffentlicht 02.02.2014 00:55:05
  • Zuletzt bearbeitet 29.04.2026 01:13:23

cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.

  • EPSS 0.35%
  • Veröffentlicht 23.11.2013 11:55:04
  • Zuletzt bearbeitet 29.04.2026 01:13:23

cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-th...

Exploit
  • EPSS 3.18%
  • Veröffentlicht 31.07.2013 13:20:25
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string endi...

  • EPSS 2.48%
  • Veröffentlicht 29.04.2013 22:55:08
  • Zuletzt bearbeitet 29.04.2026 01:13:23

The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.

Exploit
  • EPSS 44.2%
  • Veröffentlicht 08.03.2013 22:55:01
  • Zuletzt bearbeitet 29.04.2026 01:13:23

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash...