Логотип exploitDog
bind:CVE-2022-42916
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-42916

Количество 10

Количество 10

ubuntu логотип

CVE-2022-42916

около 3 лет назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-42916

около 3 лет назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-42916

около 3 лет назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-42916

около 3 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-42916

около 3 лет назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it in ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-6295-5j29-3cc8

около 3 лет назад

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-06692

около 3 лет назад

Уязвимость утилиты командной строки cURL, связанная с передачей данных в открытом виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3785-1

около 3 лет назад

Security update for curl

EPSS: Низкий
redos логотип

ROS-20221108-21

около 3 лет назад

Множественные уязвимости libcURL

CVSS3: 9.8
EPSS: Низкий
redos логотип

ROS-20221108-01

около 3 лет назад

Множественные уязвимости cURL

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
redhat логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
около 3 лет назад
debian логотип
CVE-2022-42916

In curl before 7.86.0, the HSTS check could be bypassed to trick it in ...

CVSS3: 7.5
0%
Низкий
около 3 лет назад
github логотип
GHSA-6295-5j29-3cc8

In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.

CVSS3: 7.5
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2022-06692

Уязвимость утилиты командной строки cURL, связанная с передачей данных в открытом виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
0%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3785-1

Security update for curl

около 3 лет назад
redos логотип
ROS-20221108-21

Множественные уязвимости libcURL

CVSS3: 9.8
около 3 лет назад
redos логотип
ROS-20221108-01

Множественные уязвимости cURL

CVSS3: 9.8
около 3 лет назад

Уязвимостей на страницу