This collection is limited to only include the reports that were submitted as security vulnerabilities to the curl bug-bounty program on Hackerone.
- [Critical] Curl CVE-2023-38545 vulnerability code changes are disclosed on the internet. #2199174
- Buffer Overflow Vulnerability in WebSocket Handling #2298307
- Exploitable Format String Vulnerability in curl_mfprintf Function #2819666
- Buffer overflow in strcpy #2823554
- Buffer Overflow Vulnerability in strcpy() Leading to Remote Code Execution #2871792
- Buffer Overflow Risk in Curl_inet_ntop and inet_ntop4 #2887487
- bypass of this Fixed #2437131 [ Inadequate Protocol Restriction Enforcement in curl ] #2905552
- Hackers Attack Curl Vulnerability Accessing Sensitive Information #2912277
- ("possible") UAF #2981245
- Path Traversal Vulnerability in curl via Unsanitized IPFS_PATH Environment Variable #3100073
- Buffer Overflow in curl MQTT Test Server (tests/server/mqttd.c) via Malicious CONNECT Packet #3101127
- Use of a Broken or Risky Cryptographic Algorithm (CWE-327) in libcurl #3116935
- Double Free Vulnerability in
libcurl
Cookie Management (cookie.c
) #3117697 - HTTP/2 CONTINUATION Flood Vulnerability #3125820
- HTTP/3 Stream Dependency Cycle Exploit #3125832
- Memory Leak #3137657
- Memory Leak in libcurl via Location Header Handling (CWE-770) #3158093
- Stack-based Buffer Overflow in TELNET NEW_ENV Option Handling #3230082
- HTTP Proxy Bypass via
CURLOPT_CUSTOMREQUEST
Verb Tunneling #3231321 - Use-After-Free in OpenSSL Keylog Callback via SSL_get_ex_data() in libcurl #3242005
- HTTP Request Smuggling Vulnerability Analysis - cURL Security Report #3249936
Our current policy says that we instantly ban all reporters submitting AI slop.