CVE-2020-19909
- EPSS 0.02%
- Veröffentlicht 22.08.2023 19:16:06
- Zuletzt bearbeitet 21.11.2024 05:09:29
Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associa...
CVE-2023-28321
- EPSS 0.3%
- Veröffentlicht 26.05.2023 21:15:16
- Zuletzt bearbeitet 15.01.2025 16:15:26
An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function...
CVE-2023-28322
- EPSS 0.63%
- Veröffentlicht 26.05.2023 21:15:16
- Zuletzt bearbeitet 13.02.2026 20:16:15
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if ...
CVE-2023-28320
- EPSS 0.54%
- Veröffentlicht 26.05.2023 21:15:15
- Zuletzt bearbeitet 15.01.2025 16:15:25
A denial of service vulnerability exists in curl <v8.1.0 in the way libcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow...
CVE-2023-28319
- EPSS 0.32%
- Veröffentlicht 26.05.2023 21:15:10
- Zuletzt bearbeitet 15.01.2025 16:15:25
A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error m...
CVE-2023-27533
- EPSS 0.19%
- Veröffentlicht 30.03.2023 20:15:07
- Zuletzt bearbeitet 13.02.2026 21:16:11
A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing a...
CVE-2023-27534
- EPSS 0.06%
- Veröffentlicht 30.03.2023 20:15:07
- Zuletzt bearbeitet 23.04.2025 17:16:28
A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path re...
CVE-2023-23914
- EPSS 0.13%
- Veröffentlicht 23.02.2023 20:15:13
- Zuletzt bearbeitet 12.03.2025 19:15:35
A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan...
CVE-2023-23915
- EPSS 0.05%
- Veröffentlicht 23.02.2023 20:15:13
- Zuletzt bearbeitet 13.02.2026 21:16:11
A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTP...
CVE-2023-23916
- EPSS 0.09%
- Veröffentlicht 23.02.2023 20:15:13
- Zuletzt bearbeitet 12.03.2025 19:15:36
An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms...