Lucene search

K

121 matches found

CVE
CVE
added 2015/04/24 2:59 p.m.96 views

CVE-2015-3144

The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "htt...

9CVSS9.3AI score0.02429EPSS
CVE
CVE
added 2017/11/29 6:29 p.m.95 views

CVE-2017-8818

curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.

9.8CVSS9.6AI score0.00675EPSS
CVE
CVE
added 2018/04/23 7:29 p.m.92 views

CVE-2016-9594

curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value. Having a weak or virtually non-existent random value makes the operations that use it vulnerable.

8.1CVSS7.5AI score0.00953EPSS
CVE
CVE
added 2025/06/07 8:15 a.m.88 views

CVE-2025-5399

Due to a mistake in libcurl's WebSocket code, a malicious server can send aparticularly crafted packet which makes libcurl get trapped in an endlessbusy-loop. There is no other way for the application to escape or exit this loop otherthan killing the thread/process. This might be used to DoS libcur...

7.5CVSS6.3AI score0.00048EPSS
CVE
CVE
added 2013/07/31 1:20 p.m.86 views

CVE-2013-2174

Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.

6.8CVSS6.6AI score0.09235EPSS
CVE
CVE
added 2018/03/12 3:29 p.m.86 views

CVE-2017-2628

curl, as shipped in Red Hat Enterprise Linux 6 before version 7.19.7-53, did not correctly backport the fix for CVE-2015-3148 because it did not reflect the fact that the HAVE_GSSAPI define was meanwhile substituted by USE_HTTP_NEGOTIATE. This issue was introduced in RHEL 6.7 and affects RHEL 6 cur...

9.8CVSS9.3AI score0.01442EPSS
CVE
CVE
added 2016/05/20 2:59 p.m.79 views

CVE-2016-3739

The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2) polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a numerical IP address, allow remote attackers to spoof servers via an arbitrary...

5.3CVSS5.4AI score0.01083EPSS
CVE
CVE
added 2013/03/08 10:55 p.m.76 views

CVE-2013-0249

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long ...

7.5CVSS8AI score0.38792EPSS
CVE
CVE
added 2016/06/24 5:59 p.m.75 views

CVE-2016-4802

Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or cu...

7.8CVSS7.9AI score0.00451EPSS
CVE
CVE
added 2013/04/29 10:55 p.m.74 views

CVE-2013-1944

The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.

5CVSS9.1AI score0.02482EPSS
CVE
CVE
added 2013/11/23 11:55 a.m.72 views

CVE-2013-4545

cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an ar...

4.3CVSS6.9AI score0.00666EPSS
CVE
CVE
added 2018/03/12 9:29 p.m.69 views

CVE-2016-9953

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard cer...

9.8CVSS9.8AI score0.01952EPSS
CVE
CVE
added 2018/03/12 9:29 p.m.68 views

CVE-2016-9952

The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com....

8.1CVSS7.6AI score0.01059EPSS
CVE
CVE
added 2015/06/22 7:59 p.m.67 views

CVE-2015-3236

cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.

5CVSS9.1AI score0.04499EPSS
CVE
CVE
added 2014/04/18 10:14 p.m.59 views

CVE-2014-2522

curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP ...

4CVSS6AI score0.00245EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.56 views

CVE-2005-0490

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm funct...

8.8CVSS9.1AI score0.02576EPSS
CVE
CVE
added 2025/05/28 7:15 a.m.53 views

CVE-2025-4947

libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.

6.5CVSS6.4AI score0.00018EPSS
CVE
CVE
added 2018/08/23 7:29 p.m.52 views

CVE-2003-1605

curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server.

7.5CVSS7.5AI score0.00399EPSS
CVE
CVE
added 2017/06/14 1:29 p.m.52 views

CVE-2017-9502

In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven...

5.3CVSS5.2AI score0.00593EPSS
CVE
CVE
added 2025/05/28 7:15 a.m.51 views

CVE-2025-5025

libcurl supports pinning of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC an...

4.8CVSS6.5AI score0.0002EPSS
CVE
CVE
added 2016/01/29 8:59 p.m.49 views

CVE-2016-0754

cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name.

5.3CVSS5.3AI score0.00351EPSS
Total number of security vulnerabilities121