Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
curl Vendor: haxx

About This Product

curl is a software product offered by haxx. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 135 known vulnerabilities affecting haxx curl. This includes 19 critical-severity issues and 33 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2005 to 2026, indicating a sustained research interest and ongoing security attention. 69 medium-severity issues and 14 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-0490 2005-05-02 2025-04-03 8.8 5.1 Unknown
CVE-2011-3389 2011-09-06 2025-04-11 - 4.3 Likely
CVE-2013-0249 2013-03-08 2025-04-11 - 7.5 Likely
CVE-2013-1944 2013-04-29 2025-04-11 - 5.0 Likely
CVE-2013-2174 2013-07-31 2025-04-11 - 6.8 Likely
CVE-2013-4545 2013-11-23 2025-04-11 - 4.3 Likely
CVE-2014-0015 2014-02-02 2025-04-11 - 4.0 Unknown
CVE-2014-0138 2014-04-15 2025-04-12 - 6.4 Likely
CVE-2014-0139 2014-04-15 2025-04-12 - 5.8 Likely
CVE-2014-2522 2014-04-18 2025-04-12 - 4.0 Unknown
CVE-2014-3613 2014-11-18 2025-04-12 - 5.0 Likely
CVE-2014-3620 2014-11-18 2025-04-12 - 5.0 Likely
CVE-2015-3143 2015-04-24 2025-04-12 - 5.0 Likely
CVE-2015-3144 2015-04-24 2025-04-12 - 9.0 Likely
CVE-2015-3145 2015-04-24 2025-04-12 - 7.5 Likely
CVE-2015-3148 2015-04-24 2025-04-12 - 5.0 Likely
CVE-2015-3153 2015-05-01 2025-04-12 - 5.0 Likely
CVE-2015-3236 2015-06-22 2025-04-12 - 5.0 Likely
CVE-2015-3237 2015-06-22 2025-04-12 - 6.4 Likely
CVE-2016-0754 2016-01-29 2025-04-12 5.3 5.0 Likely
CVE-2016-0755 2016-01-29 2025-04-12 7.3 5.0 Likely
CVE-2016-3739 2016-05-20 2025-04-12 5.3 2.6 Unknown
CVE-2016-4802 2016-06-24 2025-04-12 7.8 6.9 Unknown
CVE-2017-7407 2017-04-03 2025-04-20 2.4 2.1 Unknown
CVE-2017-9502 2017-06-14 2025-04-20 5.3 5.0 Likely
CVE-2017-1000101 2017-10-05 2025-04-20 6.5 4.3 Likely
CVE-2017-8816 2017-11-29 2025-04-20 9.8 7.5 Likely
CVE-2017-8817 2017-11-29 2025-04-20 9.8 7.5 Likely
CVE-2017-8818 2017-11-29 2025-04-20 9.8 7.5 Likely
CVE-2018-1000007 2018-01-24 2024-11-21 9.8 5.0 Likely
CVE-2017-2628 2018-03-12 2024-11-21 9.8 7.5 Likely
CVE-2016-9952 2018-03-12 2024-11-21 8.1 6.8 Likely
CVE-2016-9953 2018-03-12 2024-11-21 9.8 7.5 Likely
CVE-2018-1000120 2018-03-14 2024-11-21 9.8 7.5 Likely
CVE-2018-1000121 2018-03-14 2024-11-21 7.5 5.0 Likely
CVE-2018-1000122 2018-03-14 2024-11-21 9.1 6.4 Likely
CVE-2016-9586 2018-04-23 2024-11-21 5.9 6.8 Likely
CVE-2016-9594 2018-04-23 2024-11-21 6.5 6.8 Likely
CVE-2018-1000300 2018-05-24 2024-11-21 9.8 7.5 Likely
CVE-2018-1000301 2018-05-24 2024-11-21 9.1 6.4 Likely
CVE-2018-0500 2018-07-11 2024-11-21 9.8 7.5 Likely
CVE-2017-2629 2018-07-27 2024-11-21 4.3 4.0 Likely
CVE-2016-8618 2018-07-31 2024-11-21 5.3 7.5 Likely
CVE-2016-8624 2018-07-31 2024-11-21 5.3 5.0 Likely
CVE-2016-8617 2018-07-31 2024-11-21 3.3 4.4 Unknown
CVE-2016-8621 2018-07-31 2024-11-21 5.3 5.0 Likely
CVE-2016-8615 2018-08-01 2024-11-21 5.3 5.0 Likely
CVE-2016-8616 2018-08-01 2024-11-21 3.7 4.3 Likely
CVE-2016-8619 2018-08-01 2024-11-21 5.3 7.5 Likely
CVE-2016-8620 2018-08-01 2024-11-21 6.5 7.5 Likely
CVE-2016-8623 2018-08-01 2024-11-21 3.3 5.0 Likely
CVE-2016-8625 2018-08-01 2024-11-21 5.3 5.0 Likely
CVE-2003-1605 2018-08-23 2024-11-20 7.5 5.0 Likely
CVE-2018-16839 2018-10-31 2024-11-21 4.3 7.5 Likely
CVE-2018-16840 2018-10-31 2025-04-17 9.8 7.5 Likely
CVE-2018-16842 2018-10-31 2024-11-21 4.4 6.4 Likely
CVE-2019-5435 2019-05-28 2024-11-21 3.7 4.3 Likely
CVE-2019-5443 2019-07-02 2024-11-21 7.8 4.4 Unknown
CVE-2019-5481 2019-09-16 2024-11-21 9.8 7.5 Likely
CVE-2019-5482 2019-09-16 2024-11-21 9.8 7.5 Likely
CVE-2016-4606 2020-02-21 2024-11-21 9.8 7.5 Likely
CVE-2020-8169 2020-12-14 2024-11-21 7.5 5.0 Likely
CVE-2020-8177 2020-12-14 2024-11-21 7.8 4.6 Unknown
CVE-2020-8284 2020-12-14 2024-11-21 3.7 4.3 Likely
CVE-2021-22897 2021-06-11 2024-11-21 5.3 4.3 Likely
CVE-2021-22898 2021-06-11 2024-11-21 3.1 2.6 Unknown
CVE-2021-22901 2021-06-11 2024-11-21 8.1 6.8 Likely
CVE-2021-22922 2021-08-05 2024-11-21 6.5 4.3 Likely
CVE-2021-22923 2021-08-05 2024-11-21 5.3 2.6 Unknown
CVE-2021-22925 2021-08-05 2024-11-21 5.3 5.0 Likely
CVE-2021-22926 2021-08-05 2024-11-21 7.5 5.0 Likely
CVE-2021-22946 2021-09-29 2024-11-21 7.5 5.0 Likely
CVE-2021-22947 2021-09-29 2024-11-21 5.9 4.3 Likely
CVE-2022-22576 2022-05-26 2024-11-21 8.1 5.5 Likely
CVE-2022-27774 2022-06-02 2024-11-21 5.7 3.5 Unknown
CVE-2022-27775 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-27776 2022-06-02 2024-11-21 6.5 4.3 Likely
CVE-2022-27778 2022-06-02 2024-11-21 8.1 5.8 Likely
CVE-2022-27779 2022-06-02 2024-11-21 5.3 5.0 Likely
CVE-2022-27780 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-27781 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-27782 2022-06-02 2024-11-21 7.5 5.0 Likely
CVE-2022-30115 2022-06-02 2024-11-21 4.3 4.0 Likely
CVE-2022-32205 2022-07-07 2025-05-05 4.3 4.3 Likely
CVE-2022-32206 2022-07-07 2025-05-05 6.5 4.3 Likely
CVE-2022-32207 2022-07-07 2025-04-23 9.8 7.5 Likely
CVE-2022-32208 2022-07-07 2025-05-05 5.9 4.3 Likely
CVE-2022-35252 2022-09-23 2025-05-05 3.7 - -
CVE-2022-42916 2022-10-29 2026-02-13 7.5 - -
CVE-2022-42915 2022-10-29 2025-05-07 8.1 - -
CVE-2022-32221 2022-12-05 2026-02-13 9.8 - -
CVE-2022-35260 2022-12-05 2024-11-21 6.5 - -
CVE-2022-43551 2022-12-23 2026-02-13 7.5 - -
CVE-2022-43552 2023-02-09 2024-11-21 5.9 - -
CVE-2023-23914 2023-02-23 2025-03-12 9.1 - -
CVE-2023-23915 2023-02-23 2026-02-13 6.5 - -
CVE-2023-23916 2023-02-23 2025-03-12 6.5 - -
CVE-2023-27533 2023-03-30 2026-02-13 8.8 - -
CVE-2023-27534 2023-03-30 2025-04-23 8.8 - -
CVE-2023-28319 2023-05-26 2025-01-15 7.5 - -
CVE-2023-28320 2023-05-26 2025-01-15 5.9 - -
CVE-2023-28321 2023-05-26 2025-01-15 5.9 - -
CVE-2023-28322 2023-05-26 2026-02-13 3.7 - -
CVE-2020-19909 2023-08-22 2024-11-21 3.3 - -
CVE-2023-38039 2023-09-15 2025-12-02 7.5 - -
CVE-2023-46218 2023-12-07 2025-06-30 6.5 - -
CVE-2023-46219 2023-12-12 2025-12-02 5.3 - -
CVE-2024-0853 2024-02-03 2025-06-20 5.3 - -
CVE-2024-2004 2024-03-27 2025-07-30 3.5 - -
CVE-2024-2379 2024-03-27 2025-07-30 6.3 - -
CVE-2024-2398 2024-03-27 2025-07-30 8.6 - -
CVE-2024-2466 2024-03-27 2025-07-30 6.5 - -
CVE-2024-8096 2024-09-11 2025-07-30 6.5 - -
CVE-2024-9681 2024-11-06 2025-11-03 6.5 - -
CVE-2024-11053 2024-12-11 2025-11-03 3.4 - -
CVE-2025-0167 2025-02-05 2025-07-30 3.4 - -
CVE-2025-0665 2025-02-05 2025-07-30 9.8 - -
CVE-2025-0725 2025-02-05 2025-06-27 7.3 - -
CVE-2025-4947 2025-05-28 2025-06-26 6.5 - -
CVE-2025-5025 2025-05-28 2025-07-30 4.8 - -
CVE-2025-5399 2025-06-07 2025-07-30 7.5 - -
CVE-2025-10148 2025-09-12 2026-01-20 5.3 - -
CVE-2025-9086 2025-09-12 2026-01-20 7.5 - -
CVE-2025-10966 2025-11-07 2026-01-20 4.3 - -
CVE-2025-13034 2026-01-08 2026-01-20 5.9 - -
CVE-2025-14017 2026-01-08 2026-01-27 6.3 - -
CVE-2025-14524 2026-01-08 2026-01-20 5.3 - -
CVE-2025-14819 2026-01-08 2026-01-20 5.3 - -
CVE-2025-15079 2026-01-08 2026-01-20 5.3 - -
CVE-2025-15224 2026-01-08 2026-01-20 3.1 - -
CVE-2025-11563 2026-02-25 2026-02-26 4.6 - -
CVE-2026-1965 2026-03-11 2026-03-12 6.5 - -
CVE-2026-3783 2026-03-11 2026-03-12 5.3 - -
CVE-2026-3784 2026-03-11 2026-03-12 6.5 - -
CVE-2026-3805 2026-03-11 2026-03-12 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for haxx curl by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.