Search for packages
| purl | pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13 |
| Next non-vulnerable version | 7.88.1-10+deb12u7 |
| Latest non-vulnerable version | 8.18.0-2 |
| Risk | 4.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2cx5-1qnw-uufj
Aliases: CVE-2026-1965 |
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-2szj-xvgq-pkfr
Aliases: CVE-2024-2379 |
curl: QUIC certificate check bypass with wolfSSL |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-4e1k-7bj9-hfch
Aliases: CVE-2023-23914 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-4gze-cwtp-2bgr
Aliases: CVE-2023-23915 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-4seq-hvbx-7fg8
Aliases: CVE-2023-46219 |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
Affected by 0 other vulnerabilities. |
|
VCID-56wg-yafz-gkgx
Aliases: CVE-2021-22922 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-6we4-n888-6qhe
Aliases: CVE-2025-0725 |
libcurl: Buffer Overflow in libcurl via zlib Integer Overflow |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-8zks-th64-33b8
Aliases: CVE-2026-3784 |
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-ddgz-rczw-jqfw
Aliases: CVE-2023-28320 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-etzn-uhck-h7b2
Aliases: CVE-2026-3783 |
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-hrsy-694u-2fec
Aliases: CVE-2024-8096 |
curl: OCSP stapling bypass with GnuTLS |
Affected by 0 other vulnerabilities. |
|
VCID-mkyr-w79c-qqfz
Aliases: CVE-2025-14017 |
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-nvzd-v3bs-6qek
Aliases: CVE-2025-15079 |
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-pwn6-j8vf-rufk
Aliases: CVE-2024-9681 |
curl: HSTS subdomain overwrites parent cache entry |
Affected by 0 other vulnerabilities. |
|
VCID-qbpd-star-6fgn
Aliases: CVE-2021-22923 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-qpux-jh6k-8qhx
Aliases: CVE-2025-10966 |
curl: Curl missing SFTP host verification with wolfSSH backend |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-vbbv-k1r7-kkas
Aliases: CVE-2025-15224 |
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-x57x-w8g8-7ybz
Aliases: CVE-2025-14524 |
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-xpss-yndr-mycj
Aliases: CVE-2022-43551 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 0 other vulnerabilities. |
|
VCID-yaas-j3qk-kfdg
Aliases: CVE-2022-42916 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1k8f-qgcv-xkhb | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-27782
|
| VCID-2xmp-jc8v-bucb | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-35252
|
| VCID-3sy2-4f3g-zkac | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-27774
|
| VCID-47qb-2qkw-1qej | Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
CVE-2023-28321
|
| VCID-75nw-4e2d-zqgg | curl: libcurl: ASN.1 date parser overread |
CVE-2024-7264
|
| VCID-7srk-hshe-h3f4 | Improper Authentication An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. |
CVE-2023-27538
|
| VCID-9ggp-5wfj-ufcq | Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-43552
|
| VCID-9nak-pscy-e7gs | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-32221
|
| VCID-arjz-67yz-wkg9 | Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
CVE-2023-27533
|
| VCID-bb2f-7qrm-1kca | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-27781
|
| VCID-bdy2-8gub-tfe6 | Double Free When sending data to an MQTT server, libcurl could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*. |
CVE-2021-22945
|
| VCID-cbah-e86c-w3fj | Improper Authentication An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information. |
CVE-2023-27535
|
| VCID-cp4n-p2z3-43b4 | Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
CVE-2020-8177
|
| VCID-dhrf-2sz5-3bhf | Multiple vulnerabilities have been found in cURL, the worst of which may lead to arbitrary code execution. |
CVE-2019-5481
|
| VCID-fnr7-xb26-dbez | Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error. |
CVE-2020-19909
|
| VCID-frgg-29yv-dyf7 | Multiple vulnerabilities have been found in cURL, the worst of which could result in the arbitrary execution of code. |
CVE-2021-22890
|
| VCID-ggt7-eejg-xfb6 | Multiple vulnerabilities have been found in cURL, the worst of which could result in the arbitrary execution of code. |
CVE-2021-22876
|
| VCID-gnx2-djyk-uyaf | Cookie injection with none file This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle does not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course. |
CVE-2023-38546
|
| VCID-gv7x-j8bz-wycc | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-32207
|
| VCID-j5s3-rr74-nqb8 | Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
CVE-2020-8169
|
| VCID-ju6h-a1sz-f7e5 | Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
CVE-2020-8285
|
| VCID-ms2r-94ph-yyh3 | Improper Authentication An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed. |
CVE-2023-27536
|
| VCID-n51k-39uk-auca | Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
CVE-2020-8286
|
| VCID-n57n-cymy-z7dr | Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
CVE-2023-23916
|
| VCID-ph5u-5j8n-4qah | Multiple vulnerabilities have been found in cURL, the worst of which could result in the arbitrary execution of code. |
CVE-2021-22898
|
| VCID-q229-ag6u-u3hv | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-22576
|
| VCID-qdcn-2u3v-b3cv | Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
CVE-2023-46218
|
| VCID-r7bh-7wur-xffs | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-27776
|
| VCID-rmez-cwu2-2ya7 | Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
CVE-2020-8284
|
| VCID-s73y-y7v7-43cm | Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
CVE-2023-28322
|
| VCID-sh5a-fmna-wffr | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2021-22946
|
| VCID-syz5-5y6f-s7er | Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
CVE-2023-27534
|
| VCID-t1fk-cbsx-j3gh | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-32205
|
| VCID-t4gn-9fw8-gkc3 | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2021-22947
|
| VCID-t8t6-9wa3-aub7 | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-27775
|
| VCID-tcqe-7skm-b3fz | Out-of-bounds Write This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with. |
CVE-2023-38545
|
| VCID-u4bx-xqb3-vuef | Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
CVE-2024-2398
|
| VCID-wwam-tcmv-kqhc | Multiple vulnerabilities have been found in cURL, the worst of which may lead to arbitrary code execution. |
CVE-2019-5482
|
| VCID-xzay-sjpy-3yce | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-32206
|
| VCID-y32p-52ps-4ug4 | Use of Incorrectly-Resolved Name or Reference libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate. |
CVE-2021-22924
|
| VCID-y4x5-n5m2-x7bq | Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
CVE-2022-32208
|
| VCID-yvdd-ataf-ckf1 | Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
CVE-2020-8231
|