Логотип exploitDog
bind:"GHSA-q9fm-68jc-87x3" OR bind:"CVE-2023-27535"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-q9fm-68jc-87x3" OR bind:"CVE-2023-27535"

Количество 16

Количество 16

github логотип

GHSA-q9fm-68jc-87x3

около 2 лет назад

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-27535

около 2 лет назад

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-27535

больше 2 лет назад

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-27535

около 2 лет назад

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-27535

около 2 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-27535

около 2 лет назад

An authentication bypass vulnerability exists in libcurl <8.0.0 in the ...

CVSS3: 5.9
EPSS: Низкий
rocky логотип

RLSA-2023:3106

около 2 лет назад

Moderate: curl security and bug fix update

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3106

около 2 лет назад

ELSA-2023-3106: curl security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-2650

около 2 лет назад

ELSA-2023-2650: curl security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-02106

около 2 лет назад

Уязвимость библиотеки libcurl, связанная с повторным использованием FTP-соединения, позволяющая нарушителю использовать неправильные учетные данные при выполнении передачи, что потенциально может привести к раскрытию защищаемой информации

CVSS3: 5.9
EPSS: Низкий
redos логотип

ROS-20230407-01

около 2 лет назад

Множественные уязвимости libcurl

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1582-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0865-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1711-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2228-1

около 2 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2226-1

около 2 лет назад

Security update for curl

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-q9fm-68jc-87x3

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 7.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-27535

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-27535

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-27535

An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.

CVSS3: 5.9
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 5.9
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-27535

An authentication bypass vulnerability exists in libcurl <8.0.0 in the ...

CVSS3: 5.9
0%
Низкий
около 2 лет назад
rocky логотип
RLSA-2023:3106

Moderate: curl security and bug fix update

0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2023-3106

ELSA-2023-3106: curl security and bug fix update (MODERATE)

около 2 лет назад
oracle-oval логотип
ELSA-2023-2650

ELSA-2023-2650: curl security update (MODERATE)

около 2 лет назад
fstec логотип
BDU:2023-02106

Уязвимость библиотеки libcurl, связанная с повторным использованием FTP-соединения, позволяющая нарушителю использовать неправильные учетные данные при выполнении передачи, что потенциально может привести к раскрытию защищаемой информации

CVSS3: 5.9
0%
Низкий
около 2 лет назад
redos логотип
ROS-20230407-01

Множественные уязвимости libcurl

CVSS3: 5.9
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1582-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0865-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1711-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2228-1

Security update for curl

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2226-1

Security update for curl

около 2 лет назад

Уязвимостей на страницу