Haxx

Curl

142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 14.12.2020 20:15:13
  • Zuletzt bearbeitet 16.04.2026 15:16:42

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed,...

  • EPSS 1.63%
  • Veröffentlicht 21.02.2020 02:15:10
  • Zuletzt bearbeitet 21.11.2024 02:52:36

Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized act...

  • EPSS 3.61%
  • Veröffentlicht 16.09.2019 19:15:10
  • Zuletzt bearbeitet 16.04.2026 15:16:40

Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.

  • EPSS 9.72%
  • Veröffentlicht 16.09.2019 19:15:10
  • Zuletzt bearbeitet 15.04.2026 21:17:01

Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.

  • EPSS 0.99%
  • Veröffentlicht 02.07.2019 19:15:10
  • Zuletzt bearbeitet 21.11.2024 04:44:56

A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privile...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 28.05.2019 19:29:06
  • Zuletzt bearbeitet 21.11.2024 04:44:55

An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.

  • EPSS 0.16%
  • Veröffentlicht 31.10.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:25

Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.

  • EPSS 0.37%
  • Veröffentlicht 31.10.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:25

Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.

  • EPSS 0.31%
  • Veröffentlicht 31.10.2018 18:29:00
  • Zuletzt bearbeitet 17.04.2025 13:05:04

A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (witho...

  • EPSS 0.38%
  • Veröffentlicht 23.08.2018 19:29:00
  • Zuletzt bearbeitet 20.11.2024 23:47:32

curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server.