Количество 43
Количество 43
CVE-2023-46218
This flaw allows a malicious HTTP server to set "super cookies" in cur ...

CVE-2023-28322
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVE-2023-28322
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVE-2023-28322
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVE-2023-28322
CVE-2023-28322
An information disclosure vulnerability exists in curl <v8.1.0 when do ...

ROS-20240328-11
Уязвимость curl
GHSA-59mm-6rr4-j9p2
This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
ELSA-2024-1129
ELSA-2024-1129: curl security update (MODERATE)

BDU:2024-02420
Уязвимость утилиты командной строки cURL, связанная с отсутствием защиты служебных данных, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
GHSA-78jh-p6rf-g59w
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

BDU:2023-02895
Уязвимость библиотеки libcurl, связанная с ошибками при отправке HTTP-запросов POST и PUT с использованием одного и того же дескриптора, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

SUSE-SU-2023:4659-1
Security update for curl

SUSE-SU-2023:4653-1
Security update for curl
ELSA-2023-4354
ELSA-2023-4354: curl security update (MODERATE)

SUSE-SU-2023:2230-1
Security update for curl

SUSE-SU-2023:2227-1
Security update for curl

SUSE-SU-2023:2224-2
Security update for curl

SUSE-SU-2023:2224-1
Security update for curl

SUSE-SU-2023:2225-1
Security update for curl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
CVE-2023-46218 This flaw allows a malicious HTTP server to set "super cookies" in cur ... | CVSS3: 6.5 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2023-28322 An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST. | CVSS3: 3.7 | 1% Низкий | около 2 лет назад |
![]() | CVE-2023-28322 An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST. | CVSS3: 3.7 | 1% Низкий | около 2 лет назад |
![]() | CVE-2023-28322 An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST. | CVSS3: 3.7 | 1% Низкий | около 2 лет назад |
![]() | CVSS3: 3.7 | 1% Низкий | около 2 лет назад | |
CVE-2023-28322 An information disclosure vulnerability exists in curl <v8.1.0 when do ... | CVSS3: 3.7 | 1% Низкий | около 2 лет назад | |
![]() | ROS-20240328-11 Уязвимость curl | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
GHSA-59mm-6rr4-j9p2 This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with `domain=co.UK` when the URL used a lower case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад | |
ELSA-2024-1129 ELSA-2024-1129: curl security update (MODERATE) | больше 1 года назад | |||
![]() | BDU:2024-02420 Уязвимость утилиты командной строки cURL, связанная с отсутствием защиты служебных данных, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
GHSA-78jh-p6rf-g59w An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST. | CVSS3: 3.7 | 1% Низкий | около 2 лет назад | |
![]() | BDU:2023-02895 Уязвимость библиотеки libcurl, связанная с ошибками при отправке HTTP-запросов POST и PUT с использованием одного и того же дескриптора, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 7.5 | 1% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:4659-1 Security update for curl | больше 1 года назад | ||
![]() | SUSE-SU-2023:4653-1 Security update for curl | больше 1 года назад | ||
ELSA-2023-4354 ELSA-2023-4354: curl security update (MODERATE) | около 2 лет назад | |||
![]() | SUSE-SU-2023:2230-1 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:2227-1 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:2224-2 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:2224-1 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:2225-1 Security update for curl | около 2 лет назад |
Уязвимостей на страницу