Логотип exploitDog
bind:"CVE-2023-28321" OR bind:"CVE-2023-28322"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-28321" OR bind:"CVE-2023-28322"

Количество 28

Количество 28

oracle-oval логотип

ELSA-2023-4354

больше 2 лет назад

ELSA-2023-4354: curl security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2230-1

почти 3 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2227-1

почти 3 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2224-2

почти 3 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2224-1

почти 3 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2225-1

почти 3 года назад

Security update for curl

EPSS: Низкий
redos логотип

ROS-20230621-24

почти 3 года назад

Множественные уязвимости libCurl

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2228-1

почти 3 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2226-1

почти 3 года назад

Security update for curl

EPSS: Низкий
ubuntu логотип

CVE-2023-28322

почти 3 года назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2023-28322

почти 3 года назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2023-28322

почти 3 года назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2023-28322

почти 3 года назад

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2023-28322

почти 3 года назад

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2023-28321

почти 3 года назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-28321

почти 3 года назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-28321

почти 3 года назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-28321

почти 3 года назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-28321

почти 3 года назад

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-78jh-p6rf-g59w

почти 3 года назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-4354

ELSA-2023-4354: curl security update (MODERATE)

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2230-1

Security update for curl

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2227-1

Security update for curl

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2224-2

Security update for curl

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2224-1

Security update for curl

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2225-1

Security update for curl

почти 3 года назад
redos логотип
ROS-20230621-24

Множественные уязвимости libCurl

CVSS3: 7.5
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2228-1

Security update for curl

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2226-1

Security update for curl

почти 3 года назад
ubuntu логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
1%
Низкий
почти 3 года назад
redhat логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
1%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
1%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 3.7
1%
Низкий
почти 3 года назад
debian логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
1%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
почти 3 года назад
msrc логотип
CVSS3: 5.9
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
0%
Низкий
почти 3 года назад
github логотип
GHSA-78jh-p6rf-g59w

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
1%
Низкий
почти 3 года назад

Уязвимостей на страницу