This collection is limited to only include the reports that were submitted as security vulnerabilities to the curl bug-bounty program on Hackerone.
Several other issues not included here are highly suspcious as well.
- [Critical] Curl CVE-2023-38545 vulnerability code changes are disclosed on the internet. #2199174
- Buffer Overflow Vulnerability in WebSocket Handling #2298307
- Exploitable Format String Vulnerability in curl_mfprintf Function #2819666
- Buffer overflow in strcpy #2823554
- Buffer Overflow Vulnerability in strcpy() Leading to Remote Code Execution #2871792
- Buffer Overflow Risk in Curl_inet_ntop and inet_ntop4 #2887487
- bypass of this Fixed #2437131 [ Inadequate Protocol Restriction Enforcement in curl ] #2905552
- Hackers Attack Curl Vulnerability Accessing Sensitive Information #2912277
- ("possible") UAF #2981245
- Path Traversal Vulnerability in curl via Unsanitized IPFS_PATH Environment Variable #3100073
- Buffer Overflow in curl MQTT Test Server (tests/server/mqttd.c) via Malicious CONNECT Packet #3101127
- Use of a Broken or Risky Cryptographic Algorithm (CWE-327) in libcurl #3116935
- Double Free Vulnerability in
libcurlCookie Management (cookie.c) #3117697 - HTTP/2 CONTINUATION Flood Vulnerability #3125820
- HTTP/3 Stream Dependency Cycle Exploit #3125832
- Memory Leak #3137657
- Memory Leak in libcurl via Location Header Handling (CWE-770) #3158093
- Stack-based Buffer Overflow in TELNET NEW_ENV Option Handling #3230082
- HTTP Proxy Bypass via
CURLOPT_CUSTOMREQUESTVerb Tunneling #3231321 - Use-After-Free in OpenSSL Keylog Callback via SSL_get_ex_data() in libcurl #3242005
- HTTP Request Smuggling Vulnerability Analysis - cURL Security Report #3249936
- Disk Space Exhaustion leading to a Denial of Service (DoS) #3250490
- Vulnerability Report: Public Exposure of Security Audit File #3272982
- Vulnerability Report: Local File Disclosure via file:// Protocol in cURL #3293884
- Exposure of Hard-coded Private Keys and Credentials in curl Source Repository (CWE-321) #3295650
- TOCTOU Race Condition in HTTP/2 Connection Reuse Leads to Certificate Validation Bypass #3335085
- Stack Buffer Overflow in cURL Cookie Parsing Leads to RCE #3340109
- Timing Attack Vulnerability in curl Digest Authentication via Non-Constant-Time String Comparison #3346118
- Buffer Overflow in WebSocket Handshake (lib/ws.c:1287) #3392174
- Use of Deprecated strcpy() with Fixed-Size Buffers in Progress Time Formatting #3395218
- Use of Deprecated strcpy() with User-Controlled Environment Variable in Memory Debug Initialization #3395227
- Integer Overflow to Heap Overflow in DoH Response Handling #3399774
- CURLX_SET_BINMODE(NULL) can call fileno(NULL) and cause undefined behavior / crash #3400831
- Logical Flaw in curl_url_set Leads to Inconsistent Query Parameter Encoding #3403880
- Unsafe use of strcpy in Curl_ldap_err2string (packages/OS400/os400sys.c) — stack-buffer-overflow (PoC + ASan) #3418528
Our current policy says that we instantly ban all reporters submitting AI slop.

It's laughable to see some motherless idiot claiming to have discovered a vulnerability with minimal effort (maybe just a few minutes) and no verification, all in the hopes of winning a prize. If I were like you, and were to verify this claim and discover it was false, driven by AI hallucination, I'd want to smash my monitor. I applaud and commend your patience in responding to each and every one of these useless pieces of garbage.