Haxx

Libcurl

61 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.29%
  • Veröffentlicht 18.04.2014 22:14:38
  • Zuletzt bearbeitet 12.04.2025 10:46:40

curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certifica...

  • EPSS 1.2%
  • Veröffentlicht 15.04.2014 14:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to sp...

  • EPSS 1.27%
  • Veröffentlicht 15.04.2014 14:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connec...

  • EPSS 2.58%
  • Veröffentlicht 02.02.2014 00:55:05
  • Zuletzt bearbeitet 11.04.2025 00:51:21

cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.

  • EPSS 0.34%
  • Veröffentlicht 23.12.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The GnuTLS backend in libcurl 7.21.4 through 7.33.0, when disabling digital signature verification (CURLOPT_SSL_VERIFYPEER), also disables the CURLOPT_SSL_VERIFYHOST check for CN or SAN host name fields, which makes it easier for remote attackers to ...

  • EPSS 0.67%
  • Veröffentlicht 23.11.2013 11:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-th...

Exploit
  • EPSS 9.13%
  • Veröffentlicht 31.07.2013 13:20:25
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string endi...

  • EPSS 2.48%
  • Veröffentlicht 29.04.2013 22:55:08
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.

Exploit
  • EPSS 38.79%
  • Veröffentlicht 08.03.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash...

  • EPSS 1.51%
  • Veröffentlicht 07.07.2011 21:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, as used in curl and other products, always performs credential delegation during GSSAPI authentication, which allows remote servers to impersonate clients via GSS...