Pocoproject Poco vulnerabilities
8 known vulnerabilities affecting pocoproject/poco.
Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2025-45766HIGHCVSS 7.0v1.14.12025-08-06
CVE-2025-45766 [HIGH] CWE-327 CVE-2025-45766: poco v1.14.1-release was discovered to contain weak encryption. NOTE: this issue has been disputed o
poco v1.14.1-release was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record.
nvd
CVE-2025-6375MEDIUMCVSS 4.8fixed in 1.14.2v1.14.0+1 more2025-06-21
CVE-2025-6375 [MEDIUM] CWE-404 CVE-2025-6375: A vulnerability was found in poco up to 1.14.1. It has been rated as problematic. Affected by this i
A vulnerability was found in poco up to 1.14.1. It has been rated as problematic. Affected by this issue is the function MultipartInputStream of the file Net/src/MultipartReader.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to
cvelistv5nvdosv
CVE-2023-52389CRITICALCVSS 9.8fixed in 1.11.8≥ 1.12.0, < 1.12.5+2 more2024-01-27
CVE-2023-52389 [CRITICAL] CWE-190 CVE-2023-52389: UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer over
UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.
nvdosv
CVE-2016-10659HIGH≥ 0, ≤ 1.5.42019-02-18
CVE-2016-10659 [HIGH] CWE-311 poco downloads Resources over HTTP
poco downloads Resources over HTTP
Affected versions of `poco` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `poco`.
## Recommendation
No patch is currently available for this vulnerability.
The bes
ghsaosv
CVE-2017-1000472MEDIUMCVSS 6.5fixed in 1.82018-01-03
CVE-2017-1000472 [MEDIUM] CWE-22 CVE-2017-1000472: The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does
The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted ZIP file, related to a "fil
nvdosv
CVE-2014-0350MEDIUMCVSS 6.4≥ 0, < 1.3.6p1-52014-04-26
CVE-2014-0350 [MEDIUM] CVE-2014-0350: The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1
The Poco::Net::X509Certificate::verify method in the NetSSL library in POCO C++ Libraries before 1.4.6p4 allows man-in-the-middle attackers to spoof SSL servers via crafted DNS PTR records that are requested during comparison of a server name to a wildcard domain name in an X.509 certificate.
osv
CVE-2009-3560MEDIUMCVSS 5.0≥ 0, < 1.3.6p1-12009-12-04
CVE-2009-3560 [MEDIUM] CVE-2009-3560: The big2_toUtf8 function in lib/xmltok
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
osv
CVE-2009-3720MEDIUMCVSS 5.0≥ 0, < 1.3.6p1-12009-11-03
CVE-2009-3720 [MEDIUM] CVE-2009-3720: The updatePosition function in lib/xmltok_impl
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
osv