CVE-2023-28320
- EPSS 0.64%
- Published 26.05.2023 21:15:15
- Last modified 15.01.2025 16:15:25
A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow...
CVE-2023-28319
- EPSS 0.32%
- Published 26.05.2023 21:15:10
- Last modified 15.01.2025 16:15:25
A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error m...
CVE-2023-27533
- EPSS 0.14%
- Published 30.03.2023 20:15:07
- Last modified 21.11.2024 07:53:06
A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing a...
CVE-2023-27534
- EPSS 0.13%
- Published 30.03.2023 20:15:07
- Last modified 23.04.2025 17:16:28
A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path re...
CVE-2023-23914
- EPSS 0.18%
- Published 23.02.2023 20:15:13
- Last modified 12.03.2025 19:15:35
A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan...
CVE-2023-23915
- EPSS 0.05%
- Published 23.02.2023 20:15:13
- Last modified 21.11.2024 07:47:05
A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTP...
CVE-2023-23916
- EPSS 0.06%
- Published 23.02.2023 20:15:13
- Last modified 12.03.2025 19:15:36
An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms...
CVE-2022-43552
- EPSS 0.1%
- Published 09.02.2023 20:15:10
- Last modified 21.11.2024 07:26:46
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific pr...
CVE-2022-43551
- EPSS 0.03%
- Published 23.12.2022 15:15:15
- Last modified 21.11.2024 07:26:45
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the U...
CVE-2022-32221
- EPSS 1.2%
- Published 05.12.2022 22:15:10
- Last modified 21.11.2024 07:05:57
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request wh...