Количество 14
Количество 14

CVE-2023-27538
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVE-2023-27538
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVE-2023-27538
An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

CVE-2023-27538
CVE-2023-27538
An authentication bypass vulnerability exists in libcurl prior to v8.0 ...
GHSA-cgj3-cvg6-pcvh
An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.

BDU:2023-02103
Уязвимость библиотеки libcurl, связанная с обходом процедуры аутентификации, позволяющая нарушителю повторно использовать неподходящее соединение

ROS-20230407-01
Множественные уязвимости libcurl
ELSA-2023-6679
ELSA-2023-6679: curl security update (MODERATE)

SUSE-SU-2023:1582-1
Security update for curl

SUSE-SU-2023:0865-1
Security update for curl

SUSE-SU-2023:1711-1
Security update for curl

SUSE-SU-2023:2228-1
Security update for curl

SUSE-SU-2023:2226-1
Security update for curl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-27538 An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-27538 An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад |
![]() | CVE-2023-27538 An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад |
![]() | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
CVE-2023-27538 An authentication bypass vulnerability exists in libcurl prior to v8.0 ... | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
GHSA-cgj3-cvg6-pcvh An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. | CVSS3: 5.5 | 0% Низкий | около 2 лет назад | |
![]() | BDU:2023-02103 Уязвимость библиотеки libcurl, связанная с обходом процедуры аутентификации, позволяющая нарушителю повторно использовать неподходящее соединение | CVSS3: 6.5 | 0% Низкий | около 2 лет назад |
![]() | ROS-20230407-01 Множественные уязвимости libcurl | CVSS3: 5.9 | около 2 лет назад | |
ELSA-2023-6679 ELSA-2023-6679: curl security update (MODERATE) | больше 1 года назад | |||
![]() | SUSE-SU-2023:1582-1 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:0865-1 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:1711-1 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:2228-1 Security update for curl | около 2 лет назад | ||
![]() | SUSE-SU-2023:2226-1 Security update for curl | около 2 лет назад |
Уязвимостей на страницу