Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-10966

Опубликовано: 07 нояб. 2025
Источник: debian
EPSS Низкий

Описание

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed8.17.0~rc2-1package

Примечания

  • https://curl.se/docs/CVE-2025-10966.html

  • Introduced with: https://github.com/curl/curl/commit/6773c7ca65cf2183295e56603f9b86a5ce816a06 (curl-7_69_0)

  • Fixed by: https://github.com/curl/curl/commit/b011e3fcfb06d6c0278595ee2ee297036fbe9793 (rc-8_17_0-1)

  • wolfSSH backend not used in Debian

EPSS

Процентиль: 3%
0.0002
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
13 дней назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

CVSS3: 4.3
nvd
13 дней назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

msrc
12 дней назад

missing SFTP host verification with wolfSSH

CVSS3: 4.3
github
13 дней назад

curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more.

EPSS

Процентиль: 3%
0.0002
Низкий