Логотип exploitDog
bind:"CVE-2023-28321" OR bind:"CVE-2023-28322"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-28321" OR bind:"CVE-2023-28322"

Количество 27

Количество 27

oracle-oval логотип

ELSA-2023-4354

почти 2 года назад

ELSA-2023-4354: curl security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2230-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2227-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2224-2

почти 2 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2224-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2225-1

около 2 лет назад

Security update for curl

EPSS: Низкий
redos логотип

ROS-20230621-04

почти 2 года назад

Множественные уязвимости Curl

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2228-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2226-1

около 2 лет назад

Security update for curl

EPSS: Низкий
ubuntu логотип

CVE-2023-28322

около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2023-28322

около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
nvd логотип

CVE-2023-28322

около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2023-28322

около 2 лет назад

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2023-28322

около 2 лет назад

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-28321

около 2 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-28321

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-pgq4-vq29-6v5r

около 2 лет назад

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-4354

ELSA-2023-4354: curl security update (MODERATE)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2230-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2227-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2224-2

Security update for curl

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2224-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2225-1

Security update for curl

около 2 лет назад
redos логотип
ROS-20230621-04

Множественные уязвимости Curl

CVSS3: 7.5
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:2228-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2226-1

Security update for curl

около 2 лет назад
ubuntu логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
1%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
1%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.

CVSS3: 3.7
1%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 3.7
1%
Низкий
около 2 лет назад
debian логотип
CVE-2023-28322

An information disclosure vulnerability exists in curl <v8.1.0 when do ...

CVSS3: 3.7
1%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 5.9
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-28321

An improper certificate validation vulnerability exists in curl <v8.1. ...

CVSS3: 5.9
0%
Низкий
около 2 лет назад
github логотип
GHSA-pgq4-vq29-6v5r

An improper certificate validation vulnerability exists in curl <v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.

CVSS3: 5.9
0%
Низкий
около 2 лет назад

Уязвимостей на страницу