Search for packages
| purl | pkg:generic/curl.se/curl@8.3.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2cx5-1qnw-uufj
Aliases: CVE-2026-1965 |
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication |
Affected by 0 other vulnerabilities. |
|
VCID-4seq-hvbx-7fg8
Aliases: CVE-2023-46219 |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
Affected by 20 other vulnerabilities. |
|
VCID-5xp7-mcsa-uqd4
Aliases: CVE-2025-14819 |
When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not. |
Affected by 4 other vulnerabilities. |
|
VCID-6we4-n888-6qhe
Aliases: CVE-2025-0725 |
libcurl: Buffer Overflow in libcurl via zlib Integer Overflow |
Affected by 13 other vulnerabilities. |
|
VCID-75nw-4e2d-zqgg
Aliases: CVE-2024-7264 |
curl: libcurl: ASN.1 date parser overread |
Affected by 17 other vulnerabilities. |
|
VCID-8zks-th64-33b8
Aliases: CVE-2026-3784 |
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse |
Affected by 0 other vulnerabilities. |
|
VCID-etzn-uhck-h7b2
Aliases: CVE-2026-3783 |
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect |
Affected by 0 other vulnerabilities. |
|
VCID-gnx2-djyk-uyaf
Aliases: CVE-2023-38546 |
Cookie injection with none file This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle does not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course. |
Affected by 19 other vulnerabilities. |
|
VCID-hrsy-694u-2fec
Aliases: CVE-2024-8096 |
curl: OCSP stapling bypass with GnuTLS |
Affected by 16 other vulnerabilities. |
|
VCID-mkyr-w79c-qqfz
Aliases: CVE-2025-14017 |
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers |
Affected by 4 other vulnerabilities. |
|
VCID-nvzd-v3bs-6qek
Aliases: CVE-2025-15079 |
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. |
Affected by 4 other vulnerabilities. |
|
VCID-pwn6-j8vf-rufk
Aliases: CVE-2024-9681 |
curl: HSTS subdomain overwrites parent cache entry |
Affected by 16 other vulnerabilities. |
|
VCID-qdcn-2u3v-b3cv
Aliases: CVE-2023-46218 |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
Affected by 20 other vulnerabilities. |
|
VCID-qpux-jh6k-8qhx
Aliases: CVE-2025-10966 |
curl: Curl missing SFTP host verification with wolfSSH backend |
Affected by 10 other vulnerabilities. |
|
VCID-t9p4-2x7v-yfaq
Aliases: CVE-2025-0167 |
Affected by 13 other vulnerabilities. |
|
|
VCID-tcqe-7skm-b3fz
Aliases: CVE-2023-38545 |
Out-of-bounds Write This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with. |
Affected by 19 other vulnerabilities. |
|
VCID-tha5-fv3w-sub6
Aliases: CVE-2024-2004 |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
Affected by 17 other vulnerabilities. |
|
VCID-u4bx-xqb3-vuef
Aliases: CVE-2024-2398 |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
Affected by 17 other vulnerabilities. |
|
VCID-vbbv-k1r7-kkas
Aliases: CVE-2025-15224 |
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. |
Affected by 4 other vulnerabilities. |
|
VCID-wgma-bycg-1qb1
Aliases: CVE-2024-11053 |
curl: curl netrc password leak |
Affected by 16 other vulnerabilities. |
|
VCID-x57x-w8g8-7ybz
Aliases: CVE-2025-14524 |
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. |
Affected by 4 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-bz4u-6rft-s3a8 | Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
CVE-2023-38039
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:21:20.371321+00:00 | Curl Importer | Fixing | VCID-bz4u-6rft-s3a8 | https://curl.se/docs/CVE-2023-38039.json | 38.0.0 |
| 2026-04-01T18:21:20.300495+00:00 | Curl Importer | Affected by | VCID-tcqe-7skm-b3fz | https://curl.se/docs/CVE-2023-38545.json | 38.0.0 |
| 2026-04-01T18:21:20.148229+00:00 | Curl Importer | Affected by | VCID-gnx2-djyk-uyaf | https://curl.se/docs/CVE-2023-38546.json | 38.0.0 |
| 2026-04-01T18:21:19.502949+00:00 | Curl Importer | Affected by | VCID-qdcn-2u3v-b3cv | https://curl.se/docs/CVE-2023-46218.json | 38.0.0 |
| 2026-04-01T18:21:19.214313+00:00 | Curl Importer | Affected by | VCID-4seq-hvbx-7fg8 | https://curl.se/docs/CVE-2023-46219.json | 38.0.0 |
| 2026-04-01T18:21:19.102803+00:00 | Curl Importer | Affected by | VCID-tha5-fv3w-sub6 | https://curl.se/docs/CVE-2024-2004.json | 38.0.0 |
| 2026-04-01T18:21:18.990147+00:00 | Curl Importer | Affected by | VCID-u4bx-xqb3-vuef | https://curl.se/docs/CVE-2024-2398.json | 38.0.0 |
| 2026-04-01T18:21:18.541758+00:00 | Curl Importer | Affected by | VCID-75nw-4e2d-zqgg | https://curl.se/docs/CVE-2024-7264.json | 38.0.0 |
| 2026-04-01T18:21:18.154329+00:00 | Curl Importer | Affected by | VCID-hrsy-694u-2fec | https://curl.se/docs/CVE-2024-8096.json | 38.0.0 |
| 2026-04-01T18:21:17.790666+00:00 | Curl Importer | Affected by | VCID-pwn6-j8vf-rufk | https://curl.se/docs/CVE-2024-9681.json | 38.0.0 |
| 2026-04-01T18:21:17.627489+00:00 | Curl Importer | Affected by | VCID-wgma-bycg-1qb1 | https://curl.se/docs/CVE-2024-11053.json | 38.0.0 |
| 2026-04-01T18:21:17.464819+00:00 | Curl Importer | Affected by | VCID-t9p4-2x7v-yfaq | https://curl.se/docs/CVE-2025-0167.json | 38.0.0 |
| 2026-04-01T18:21:17.267022+00:00 | Curl Importer | Affected by | VCID-6we4-n888-6qhe | https://curl.se/docs/CVE-2025-0725.json | 38.0.0 |
| 2026-04-01T18:21:16.373165+00:00 | Curl Importer | Affected by | VCID-qpux-jh6k-8qhx | https://curl.se/docs/CVE-2025-10966.json | 38.0.0 |
| 2026-04-01T18:21:16.066513+00:00 | Curl Importer | Affected by | VCID-mkyr-w79c-qqfz | https://curl.se/docs/CVE-2025-14017.json | 38.0.0 |
| 2026-04-01T18:21:15.526825+00:00 | Curl Importer | Affected by | VCID-x57x-w8g8-7ybz | https://curl.se/docs/CVE-2025-14524.json | 38.0.0 |
| 2026-04-01T18:21:15.122839+00:00 | Curl Importer | Affected by | VCID-5xp7-mcsa-uqd4 | https://curl.se/docs/CVE-2025-14819.json | 38.0.0 |
| 2026-04-01T18:21:14.993014+00:00 | Curl Importer | Affected by | VCID-nvzd-v3bs-6qek | https://curl.se/docs/CVE-2025-15079.json | 38.0.0 |
| 2026-04-01T18:21:14.720497+00:00 | Curl Importer | Affected by | VCID-vbbv-k1r7-kkas | https://curl.se/docs/CVE-2025-15224.json | 38.0.0 |
| 2026-04-01T18:21:14.434141+00:00 | Curl Importer | Affected by | VCID-2cx5-1qnw-uufj | https://curl.se/docs/CVE-2026-1965.json | 38.0.0 |
| 2026-04-01T18:21:13.797317+00:00 | Curl Importer | Affected by | VCID-etzn-uhck-h7b2 | https://curl.se/docs/CVE-2026-3783.json | 38.0.0 |
| 2026-04-01T18:21:13.364923+00:00 | Curl Importer | Affected by | VCID-8zks-th64-33b8 | https://curl.se/docs/CVE-2026-3784.json | 38.0.0 |