Haxx

Libcurl

61 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Published 30.03.2023 20:15:07
  • Last modified 09.06.2025 15:15:28

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if...

Exploit
  • EPSS 0.35%
  • Published 23.09.2021 13:15:08
  • Last modified 09.06.2025 15:15:25

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

Exploit
  • EPSS 0.75%
  • Published 05.08.2021 21:15:11
  • Last modified 09.06.2025 15:15:24

libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the invo...

Exploit
  • EPSS 0.06%
  • Published 01.04.2021 18:15:12
  • Last modified 09.06.2025 15:15:23

curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically...

Exploit
  • EPSS 0.13%
  • Published 01.04.2021 18:15:12
  • Last modified 09.06.2025 15:15:24

curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving fro...

Exploit
  • EPSS 0.28%
  • Published 14.12.2020 20:15:14
  • Last modified 21.11.2024 05:38:39

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

Exploit
  • EPSS 0.59%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:39

curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.

Exploit
  • EPSS 0.11%
  • Published 14.12.2020 20:15:13
  • Last modified 21.11.2024 05:38:33

Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.

Exploit
  • EPSS 29.54%
  • Published 28.05.2019 19:29:06
  • Last modified 21.11.2024 04:44:55

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.

Exploit
  • EPSS 2.1%
  • Published 06.02.2019 20:29:00
  • Last modified 21.11.2024 04:42:37

libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed n...