Логотип exploitDog
bind:"CVE-2025-9086"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-9086"

Количество 15

Количество 15

ubuntu логотип

CVE-2025-9086

4 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-9086

4 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-9086

4 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-9086

4 месяца назад

Out of bounds read for cookie path

EPSS: Низкий
debian логотип

CVE-2025-9086

4 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2 ...

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2025:23383

27 дней назад

Moderate: curl security update

EPSS: Низкий
github логотип

GHSA-v676-f8gm-92r9

4 месяца назад

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-23383

29 дней назад

ELSA-2025-23383: curl security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2025-12599

4 месяца назад

Уязвимость утилиты командной строки cURL, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03268-1

4 месяца назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03267-1

4 месяца назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03173-1

4 месяца назад

Security update for curl

EPSS: Низкий
redos логотип

ROS-20251006-02

3 месяца назад

Уязвимость curl

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:20090-1

около 2 месяцев назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03198-1

4 месяца назад

Security update for curl

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-9086

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 7.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-9086

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 5.3
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-9086

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 7.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-9086

Out of bounds read for cookie path

0%
Низкий
4 месяца назад
debian логотип
CVE-2025-9086

1. A cookie is set using the `secure` keyword for `https://target` 2 ...

CVSS3: 7.5
0%
Низкий
4 месяца назад
rocky логотип
RLSA-2025:23383

Moderate: curl security update

0%
Низкий
27 дней назад
github логотип
GHSA-v676-f8gm-92r9

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

CVSS3: 7.5
0%
Низкий
4 месяца назад
oracle-oval логотип
ELSA-2025-23383

ELSA-2025-23383: curl security update (MODERATE)

29 дней назад
fstec логотип
BDU:2025-12599

Уязвимость утилиты командной строки cURL, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03268-1

Security update for curl

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03267-1

Security update for curl

4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03173-1

Security update for curl

4 месяца назад
redos логотип
ROS-20251006-02

Уязвимость curl

CVSS3: 7.5
0%
Низкий
3 месяца назад
suse-cvrf логотип
openSUSE-SU-2025:20090-1

Security update for curl

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03198-1

Security update for curl

4 месяца назад

Уязвимостей на страницу