Haxx

Curl

121 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.16%
  • Published 05.08.2021 21:15:11
  • Last modified 21.11.2024 05:50:55

When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, p...

Exploit
  • EPSS 0.11%
  • Published 05.08.2021 21:15:11
  • Last modified 21.11.2024 05:50:55

When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or...

Exploit
  • EPSS 0.38%
  • Published 05.08.2021 21:15:11
  • Last modified 21.11.2024 05:50:55

curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be ...

Exploit
  • EPSS 0.51%
  • Published 05.08.2021 21:15:11
  • Last modified 21.11.2024 05:50:56

libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Trans...

Exploit
  • EPSS 0.13%
  • Published 11.06.2021 16:15:11
  • Last modified 21.11.2024 05:50:52

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NE...

Exploit
  • EPSS 0.34%
  • Published 11.06.2021 16:15:11
  • Last modified 21.11.2024 05:50:52

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentia...

Exploit
  • EPSS 1.08%
  • Published 11.06.2021 16:15:10
  • Last modified 21.11.2024 05:50:51

curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" ...

Exploit
  • EPSS 0.05%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:25

curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).

Exploit
  • EPSS 0.02%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:26

curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.

  • EPSS 0.1%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:39

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed,...