Логотип exploitDog
bind:"CVE-2023-28321" OR bind:"CVE-2023-28322"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-28321" OR bind:"CVE-2023-28322"

Количество 28

Количество 28

oracle-oval логотип

ELSA-2023-4354

больше 2 лет назад

ELSA-2023-4354: curl security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2230-1

больше 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2227-1

больше 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2224-2

больше 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2224-1

больше 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2225-1

больше 2 лет назад

Security update for curl

EPSS: Низкий
redos логотип

ROS-20230621-24

больше 2 лет назад

Множественные уязвимости libCurl

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2228-1

больше 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2226-1

больше 2 лет назад

Security update for curl

EPSS: Низкий
ubuntu логотип

CVE-2023-28322

больше 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2023-28322

больше 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2023-28322

больше 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2023-28322

больше 2 лет назад

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2023-28322

больше 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2023-28321

больше 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-28321

больше 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-28321

больше 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-28321

больше 2 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-28321

больше 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-78jh-p6rf-g59w

больше 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-4354

ELSA-2023-4354: curl security update (MODERATE)

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2230-1

Security update for curl

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2227-1

Security update for curl

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2224-2

Security update for curl

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2224-1

Security update for curl

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2225-1

Security update for curl

больше 2 лет назад
redos логотип
ROS-20230621-24

Множественные уязвимости libCurl

CVSS3: 7.5
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2228-1

Security update for curl

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2226-1

Security update for curl

больше 2 лет назад
ubuntu логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 3.7
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
1%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
1%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 5.9
1%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
1%
Низкий
больше 2 лет назад
github логотип
GHSA-78jh-p6rf-g59w

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу