Логотип exploitDog
bind:"CVE-2023-27536" OR bind:"CVE-2023-28321"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-27536" OR bind:"CVE-2023-28321"

Количество 31

Количество 31

rocky логотип

RLSA-2023:4523

больше 1 года назад

Moderate: curl security update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-4523

почти 2 года назад

ELSA-2023-4523: curl security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2228-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2226-1

около 2 лет назад

Security update for curl

EPSS: Низкий
ubuntu логотип

CVE-2023-27536

около 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-27536

больше 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-27536

около 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-27536

около 2 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-27536

около 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the co ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-28321

около 2 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-4f9f-mpmj-4c52

около 2 лет назад

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-02109

около 2 лет назад

Уязвимость функции повторного использования соединения библиотеки libcurl, позволяющая нарушителю повлиять на передачу данных krb5/kerberos / negotiate /GSSAPI и потенциально привести к несанкционированному доступу к конфиденциальной информации

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-pgq4-vq29-6v5r

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2023-03648

около 2 лет назад

Уязвимость утилиты командной строки cURL, связанная с ошибками процедуры подтверждения подлинности сертификата при сопоставлении подстановочных знаков в сертификатах TLS для имен IDN, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2023-02106

около 2 лет назад

Уязвимость библиотеки libcurl, связанная с повторным использованием FTP-соединения, позволяющая нарушителю использовать неправильные учетные данные при выполнении передачи, что потенциально может привести к раскрытию защищаемой информации

CVSS3: 5.9
EPSS: Низкий
oracle-oval логотип

ELSA-2023-4354

почти 2 года назад

ELSA-2023-4354: curl security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2023:4523

Moderate: curl security update

больше 1 года назад
oracle-oval логотип
ELSA-2023-4523

ELSA-2023-4523: curl security update (MODERATE)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2228-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2226-1

Security update for curl

около 2 лет назад
ubuntu логотип
CVE-2023-27536

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-27536

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-27536

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 5.9
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-27536

An authentication bypass vulnerability exists libcurl <8.0.0 in the co ...

CVSS3: 5.9
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 5.9
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
0%
Низкий
около 2 лет назад
github логотип
GHSA-4f9f-mpmj-4c52

An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.

CVSS3: 9.8
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-02109

Уязвимость функции повторного использования соединения библиотеки libcurl, позволяющая нарушителю повлиять на передачу данных krb5/kerberos / negotiate /GSSAPI и потенциально привести к несанкционированному доступу к конфиденциальной информации

CVSS3: 5.9
0%
Низкий
около 2 лет назад
github логотип
GHSA-pgq4-vq29-6v5r

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-03648

Уязвимость утилиты командной строки cURL, связанная с ошибками процедуры подтверждения подлинности сертификата при сопоставлении подстановочных знаков в сертификатах TLS для имен IDN, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 5.9
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-02106

Уязвимость библиотеки libcurl, связанная с повторным использованием FTP-соединения, позволяющая нарушителю использовать неправильные учетные данные при выполнении передачи, что потенциально может привести к раскрытию защищаемой информации

CVSS3: 5.9
0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2023-4354

ELSA-2023-4354: curl security update (MODERATE)

почти 2 года назад

Уязвимостей на страницу