Логотип exploitDog
bind:"BDU:2022-06692" OR bind:"CVE-2022-42916"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-06692" OR bind:"CVE-2022-42916"

Количество 9

Количество 9

fstec логотип

BDU:2022-06692

почти 3 года назад

Уязвимость утилиты командной строки cURL, связанная с передачей данных в открытом виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-42916

почти 3 года назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-42916

почти 3 года назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-42916

почти 3 года назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-42916

почти 3 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-42916

почти 3 года назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it in ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-6295-5j29-3cc8

почти 3 года назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3785-1

почти 3 года назад

Security update for curl

EPSS: Низкий
redos логотип

ROS-20221108-01

почти 3 года назад

Множественные уязвимости cURL

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-06692

Уязвимость утилиты командной строки cURL, связанная с передачей данных в открытом виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 7.5
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it in ...

CVSS3: 7.5
0%
Низкий
почти 3 года назад
github логотип
GHSA-6295-5j29-3cc8

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:3785-1

Security update for curl

почти 3 года назад
redos логотип
ROS-20221108-01

Множественные уязвимости cURL

CVSS3: 9.8
почти 3 года назад

Уязвимостей на страницу