CVE-2022-35737
- EPSS 63.95%
- Published 03.08.2022 06:15:07
- Last modified 21.11.2024 07:11:34
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
CVE-2022-32208
- EPSS 0.3%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:13
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
CVE-2022-32207
- EPSS 0.17%
- Published 07.07.2022 13:15:08
- Last modified 23.04.2025 18:15:53
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen...
CVE-2022-32206
- EPSS 2.57%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:13
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allo...
CVE-2022-32205
- EPSS 1.4%
- Published 07.07.2022 13:15:08
- Last modified 05.05.2025 17:18:12
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the...
CVE-2022-32156
- EPSS 0.19%
- Published 15.06.2022 17:15:09
- Last modified 21.11.2024 07:05:51
In Splunk Enterprise and Universal Forwarder versions before 9.0, the Splunk command-line interface (CLI) did not validate TLS certificates while connecting to a remote Splunk platform instance by default. After updating to version 9.0, see Configur...
CVE-2022-30115
- EPSS 0.06%
- Published 02.06.2022 14:15:51
- Last modified 21.11.2024 07:02:11
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while no...
CVE-2022-27779
- EPSS 0.19%
- Published 02.06.2022 14:15:44
- Last modified 21.11.2024 06:56:10
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://public...
CVE-2022-27782
- EPSS 0.27%
- Published 02.06.2022 14:15:44
- Last modified 21.11.2024 06:56:10
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them...
CVE-2022-27781
- EPSS 0.05%
- Published 02.06.2022 14:15:44
- Last modified 21.11.2024 06:56:10
libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending bus...