curl / Docs / Releases / curl CVEs

curl CVEs

If you find or simply suspect a security problem in curl or libcurl, please file a detailed report on our hackerone page and tell.

See also the Vulnerabilities Table to see what versions that are vulnerable to what flaws.

Published vulnerabilities

All | Medium+ | High+ | Critical

(The table below shows vulnerabilities of all severity levels)

#SWCVulnerabilityPublishedFirstLastAwarded
167
L
libCVE-2025-5399: WebSocket endless loop2025-06-048.13.08.14.0505 USD
166
M
CVE-2025-5025: No QUIC certificate pinning with wolfSSL2025-05-288.5.08.13.02540 USD
165
M
CVE-2025-4947: QUIC certificate check skip with wolfSSL2025-05-288.8.08.13.02540 USD
164
L
C
CVE-2025-0725: gzip integer overflow2025-02-057.10.58.11.1505 USD
163
L
CVE-2025-0665: eventfd double close2025-02-058.11.18.11.1505 USD
162
L
CVE-2025-0167: netrc and default credential2025-02-057.76.08.11.1505 USD
161
L
CVE-2024-11053: netrc and redirect credential2024-12-117.76.08.11.0505 USD
160
L
CVE-2024-9681: HSTS subdomain overwrites parent cache entry2024-11-057.74.08.10.1540 USD
159
M
CVE-2024-8096: OCSP stapling bypass with GnuTLS2024-09-117.41.08.9.12540 USD
158
L
C
CVE-2024-7264: ASN.1 date parser overread2024-07-317.32.08.9.0540 USD
157
L
lib
C
CVE-2024-6874: macidn punycode buffer overread2024-07-248.8.08.8.0540 USD
156
M
C
CVE-2024-6197: freeing stack buffer in utf8asn1str2024-07-248.6.08.8.02540 USD
155
M
CVE-2024-2466: TLS certificate check bypass with mbedTLS2024-03-278.5.08.6.02540 USD
154
M
libCVE-2024-2398: HTTP/2 push headers memory-2024-03-277.44.08.6.02540 USD
153
L
CVE-2024-2379: QUIC certificate check bypass with wolfSSL2024-03-278.6.08.6.0540 USD
152
L
CVE-2024-2004: Usage of disabled protocol2024-03-277.85.08.6.0540 USD
151
L
CVE-2024-0853: OCSP verification bypass with TLS session reuse2024-01-318.5.08.5.0540 USD
150
L
CVE-2023-46219: HSTS long filename clears contents2023-12-067.84.08.4.0540 USD
149
M
CVE-2023-46218: cookie mixed case PSL bypass2023-12-067.46.08.4.02540 USD
148
L
libCVE-2023-38546: cookie injection with none file2023-10-117.9.18.3.0540 USD
147
H
C
CVE-2023-38545: SOCKS5 heap buffer overflow2023-10-117.69.08.3.04660 USD
146
M
CVE-2023-38039: HTTP headers eat all memory2023-09-137.84.08.2.12540 USD
145
L
libCVE-2023-28322: more POST-after-PUT confusion2023-05-177.78.0.1480 USD
144
L
CVE-2023-28321: IDN wildcard match2023-05-177.12.08.0.1480 USD
143
L
libCVE-2023-28320: siglongjmp race condition2023-05-177.9.88.0.1480 USD
142
M
C
CVE-2023-28319: UAF in SSH sha256 fingerprint check2023-05-177.81.08.0.12400 USD
141
L
CVE-2023-27538: SSH connection too eager reuse still2023-03-207.16.17.88.1480 USD
140
L
lib
C
CVE-2023-27537: HSTS double free2023-03-207.88.07.88.1480 USD
139
L
libCVE-2023-27536: GSS delegation too eager connection re-use2023-03-207.22.07.88.1480 USD
138
M
CVE-2023-27535: FTP too eager connection reuse2023-03-207.13.07.88.12400 USD
137
L
CVE-2023-27534: SFTP path ~ resolving discrepancy2023-03-207.18.07.88.1480 USD
136
L
CVE-2023-27533: TELNET option IAC injection2023-03-207.77.88.1480 USD
135
M
CVE-2023-23916: HTTP multi-header compression denial of service2023-02-157.57.07.87.02400 USD
134
L
CVE-2023-23915: HSTS amnesia with --parallel2023-02-157.77.07.87.0480 USD
133
L
CVE-2023-23914: HSTS ignored on multiple requests2023-02-157.77.07.87.0480 USD
132
L
C
CVE-2022-43552: HTTP Proxy deny use after free2022-12-217.16.07.86.0
131
M
CVE-2022-43551: Another HSTS bypass via IDN2022-12-217.77.07.86.02400 USD
130
M
CVE-2022-42916: HSTS bypass via IDN2022-10-267.77.07.85.02400 USD
129
M
C
CVE-2022-42915: HTTP proxy double free2022-10-267.77.07.85.0
128
L
C
CVE-2022-35260: .netrc parser out-of-bounds access2022-10-267.84.07.85.0480 USD
127
M
libCVE-2022-32221: POST following PUT confusion2022-10-267.77.85.02400 USD
126
L
CVE-2022-35252: control code in cookie denial of service2022-08-314.97.84.0480 USD
125
L
CVE-2022-32208: FTP-KRB bad message verification2022-06-277.16.47.83.1480 USD
124
M
CVE-2022-32207: Non-preserved file permissions2022-06-277.69.07.83.12400 USD
123
M
CVE-2022-32206: HTTP compression denial of service2022-06-277.57.07.83.12400 USD
122
L
CVE-2022-32205: Set-Cookie denial of service2022-06-277.71.07.83.1480 USD
121
M
CVE-2022-30115: HSTS bypass via trailing dot2022-05-117.82.07.83.02400 USD
120
M
CVE-2022-27782: TLS and SSH connection too eager reuse2022-05-117.16.17.83.02400 USD
119
L
libCVE-2022-27781: CERTINFO never-ending busy-loop2022-05-117.34.07.83.0
118
M
CVE-2022-27780: percent-encoded path separator in URL host2022-05-117.80.07.83.02400 USD
117
M
CVE-2022-27779: cookie for trailing dot TLD2022-05-117.82.07.83.02400 USD
116
M
toolCVE-2022-27778: curl removes wrong file on error2022-05-117.83.07.83.02400 USD
115
L
CVE-2022-27776: Auth/cookie on redirect2022-04-274.97.82.0480 USD
114
L
CVE-2022-27775: Bad local IPv6 connection reuse2022-04-277.65.07.82.0480 USD
113
M
CVE-2022-27774: Credential on redirect2022-04-274.97.82.02400 USD
112
M
CVE-2022-22576: OAUTH2 bearer bypass in connection re-use2022-04-277.33.07.82.02400 USD
111
M
CVE-2021-22947: STARTTLS protocol injection via MITM2021-09-157.20.07.78.01500 USD
110
M
CVE-2021-22946: Protocol downgrade required TLS bypassed2021-09-157.20.07.78.01000 USD
109
M
C
CVE-2021-22945: UAF and double free in MQTT sending2021-09-157.73.07.78.01000 USD
108
M
CVE-2021-22926: CURLOPT_SSLCERT mix-up with Secure Transport2021-07-217.33.07.77.01000 USD
107
M
C
CVE-2021-22925: TELNET stack contents disclosure again2021-07-217.77.77.0800 USD
106
M
CVE-2021-22924: Bad connection reuse due to flawed path name checks2021-07-217.10.47.77.01200 USD
105
M
toolCVE-2021-22923: Metalink download sends credentials2021-07-217.27.07.77.0700 USD
104
M
toolCVE-2021-22922: Wrong content via Metalink not discarded2021-07-217.27.07.77.0700 USD
103
H
C
CVE-2021-22901: TLS session caching disaster2021-05-267.75.07.76.12000 USD
102
M
C
CVE-2021-22898: TELNET stack contents disclosure2021-05-267.77.76.11000 USD
101
L
CVE-2021-22897: Schannel cipher selection surprise2021-05-267.61.07.76.1800 USD
100
L
CVE-2021-22890: TLS 1.3 session ticket proxy host mix-up2021-03-317.63.07.75.0
99
L
CVE-2021-22876: Automatic referer s credentials2021-03-317.1.17.75.0800 USD
98
M
CVE-2020-8286: Inferior OCSP verification2020-12-097.41.07.73.0900 USD
97
M
libCVE-2020-8285: FTP wildcard stack overflow2020-12-097.21.07.73.0
96
L
CVE-2020-8284: trusting FTP PASV responses2020-12-094.07.73.0700 USD
95
L
libCVE-2020-8231: wrong connect-only connection2020-08-197.29.07.71.1500 USD
94
M
toolCVE-2020-8177: curl overwrite local file with -J2020-06-247.20.07.70.0700 USD
93
M
CVE-2020-8169: Partial password over DNS on HTTP redirect2020-06-247.62.07.70.0400 USD
92
M
C
CVE-2019-5481: FTP-KRB double free2019-09-117.52.07.65.3200 USD
91
M
lib
C
CVE-2019-5482: TFTP small blocksize heap buffer overflow2019-09-117.19.47.65.3250 USD
90
H
CVE-2019-5443: Windows OpenSSL engine code injection2019-06-247.44.07.65.1200 USD
89
L
C
CVE-2019-5436: TFTP receive buffer overflow2019-05-227.19.47.64.1200 USD
88
L
C
CVE-2019-5435: Integer overflows in URL parser2019-05-227.62.07.64.1150 USD
87
M
C
CVE-2018-16890: NTLM type-2 out-of-bounds buffer read2019-02-067.36.07.63.0
86
H
C
CVE-2019-3822: NTLMv2 type-3 header stack buffer overflow2019-02-067.36.07.63.0
85
L
C
CVE-2019-3823: SMTP end-of-response out-of-bounds read2019-02-067.34.07.63.0
84
L
tool
C
CVE-2018-16842: warning message out-of-buffer read2018-10-317.14.17.61.1100 USD
83
L
C
CVE-2018-16840: use after free in handle close2018-10-317.59.07.61.1100 USD
82
L
C
CVE-2018-16839: SASL password overflow via integer overflow2018-10-317.33.07.61.1
81
H
C
CVE-2018-14618: NTLM password overflow via integer overflow2018-09-057.15.47.61.0
80
H
C
CVE-2018-0500: SMTP send heap buffer overflow2018-07-117.54.17.60.0
79
H
C
CVE-2018-1000300: FTP shutdown response buffer overflow2018-05-167.54.17.59.0
78
M
C
CVE-2018-1000301: RTSP bad headers buffer over-read2018-05-167.20.07.59.0
77
M
C
CVE-2018-1000122: RTSP RTP buffer over-read2018-03-147.20.07.58.0
76
L
C
CVE-2018-1000121: LDAP NULL pointer dereference2018-03-147.21.07.58.0
75
H
C
CVE-2018-1000120: FTP path trickery leads to NIL byte out of bounds write2018-03-147.12.37.58.0
74
L
CVE-2018-1000007: HTTP authentication in redirects2018-01-246.07.57.0
73
L
C
CVE-2018-1000005: HTTP/2 trailer out-of-bounds read2018-01-247.49.07.57.0
72
H
C
CVE-2017-8818: SSL out of buffer access2017-11-297.56.07.56.1
71
M
lib
C
CVE-2017-8817: FTP wildcard out of bounds read2017-11-297.21.07.56.1
70
M
C
CVE-2017-8816: NTLM buffer overflow via integer overflow2017-11-297.36.07.56.1
69
M
C
CVE-2017-1000257: IMAP FETCH response out of bounds read2017-10-127.20.07.56.0
68
M
C
CVE-2017-1000254: FTP PWD response parser out of bounds read2017-10-047.77.55.1
67
M
tool
C
CVE-2017-1000101: URL globbing out of bounds read2017-08-097.34.07.54.1
66
H
C
CVE-2017-1000100: TFTP sends more than buffer size2017-08-097.15.07.54.1
65
M
C
CVE-2017-1000099: FILE buffer read out of bounds2017-08-097.54.17.54.1
64
H
C
CVE-2017-9502: URL file scheme drive letter buffer overflow2017-06-147.53.07.54.0
63
H
CVE-2017-7468: TLS session resumption client cert bypass (again)2017-04-197.52.07.53.1
62
M
tool
C
CVE-2017-7407: --write-out out of buffer read2017-04-036.57.53.1
61
M
CVE-2017-2629: SSL_VERIFYSTATUS ignored2017-02-227.52.07.52.1
60
H
CVE-2016-9594: uninitialized random2016-12-237.52.07.52.0
59
M
lib
C
CVE-2016-9586: printf floating point buffer overflow2016-12-215.47.51.0
58
M
CVE-2016-9952: Win CE Schannel cert wildcard matches too much2016-12-217.27.07.51.0
57
M
C
CVE-2016-9953: Win CE Schannel cert name out of buffer read2016-12-217.27.07.51.0
56
H
CVE-2016-8615: cookie injection for other servers2016-11-024.97.50.3
55
M
CVE-2016-8616: case insensitive password comparison2016-11-027.77.50.3
54
M
C
CVE-2016-8617: OOB write via unchecked multiplication2016-11-027.8.17.50.3
53
M
lib
C
CVE-2016-8618: double free in curl_maprintf2016-11-025.47.50.3
52
H
C
CVE-2016-8619: double free in krb5 code2016-11-027.37.50.3
51
M
tool
C
CVE-2016-8620: glob parser write/read out of bounds2016-11-027.34.07.50.3
50
M
C
CVE-2016-8621: curl_getdate read out of bounds2016-11-027.12.27.50.3
49
M
C
CVE-2016-8622: URL unescape heap overflow via integer truncation2016-11-027.24.07.50.3
48
H
lib
C
CVE-2016-8623: Use after free via shared cookies2016-11-027.10.77.50.3
47
M
CVE-2016-8624: invalid URL parsing with '#'2016-11-026.07.50.3
46
H
CVE-2016-8625: IDNA 2003 makes curl use wrong host2016-11-027.12.07.50.3
45
M
lib
C
CVE-2016-7167: curl escape and unescape integer overflows2016-09-147.11.17.50.2
44
H
CVE-2016-7141: Incorrect reuse of client certificates2016-09-077.19.67.50.1
43
H
CVE-2016-5419: TLS session resumption client cert bypass2016-08-035.07.50.0
42
M
CVE-2016-5420: Re-using connections with wrong client cert2016-08-037.77.50.0
41
H
lib
C
CVE-2016-5421: use of connection struct after free2016-08-037.32.07.50.0
40
H
CVE-2016-4802: Windows DLL hijacking2016-05-307.11.17.49.0
39
H
CVE-2016-3739: TLS certificate check bypass with mbedTLS/PolarSSL2016-05-187.21.07.48.0
38
H
toolCVE-2016-0754: remote filename path traversal in curl tool for Windows2016-01-274.07.46.0
37
M
CVE-2016-0755: NTLM credentials not-checked for proxy connection re-use2016-01-277.10.77.46.0
36
H
C
CVE-2015-3237: SMB send off unrelated memory contents2015-06-177.40.07.42.1
35
H
CVE-2015-3236: lingering HTTP credentials in connection re-use2015-06-177.40.07.42.1
34
H
CVE-2015-3153: sensitive HTTP server headers also sent to proxies2015-04-294.07.42.0
33
M
C
CVE-2015-3144: hostname out of boundary memory access2015-04-227.37.07.41.0
32
M
C
CVE-2015-3145: cookie parser out of boundary memory access2015-04-227.31.07.41.0
31
M
CVE-2015-3148: Negotiate not treated as connection-oriented2015-04-227.10.67.41.0
30
M
CVE-2015-3143: Re-using authenticated connection when unauthenticated2015-04-227.10.67.41.0
29
M
CVE-2014-8151: Secure Transport certificate check bypass2015-01-087.31.07.39.0
28
H
CVE-2014-8150: URL request injection2015-01-086.07.39.0
27
M
lib
C
CVE-2014-3707: duphandle read out of bounds2014-11-057.17.17.38.0
26
H
CVE-2014-3620: cookie for TLDs2014-09-107.31.07.37.1
25
M
CVE-2014-3613: cookie with IP address as domain2014-09-104.07.37.1
24
M
CVE-2014-2522: not verifying certs for TLS to IP address / Schannel2014-03-267.27.07.35.0
23
M
CVE-2014-1263: not verifying certs for TLS to IP address / Secure Transport2014-03-267.27.07.35.0
22
M
CVE-2014-0139: IP address wildcard certificate validation2014-03-267.10.37.35.0
21
M
CVE-2014-0138: wrong re-use of connections2014-03-267.10.67.35.0
20
M
CVE-2014-0015: re-use of wrong HTTP NTLM connection2014-01-297.10.67.34.0
19
M
libCVE-2013-6422: cert name check ignore with GnuTLS2013-12-177.21.47.33.0
18
M
libCVE-2013-4545: cert name check ignore OpenSSL2013-11-157.18.07.32.0
17
H
lib
C
CVE-2013-2174: URL decode buffer boundary flaw2013-06-227.77.30.0
16
H
CVE-2013-1944: cookie domain tailmatch2013-04-124.77.29.0
15
C
C
CVE-2013-0249: SASL buffer overflow2013-02-067.26.07.28.1
14
H
CVE-2011-3389: SSL CBC IV vulnerability2012-01-247.10.67.23.1
13
H
CVE-2012-0036: URL sanitization vulnerability2012-01-247.20.07.23.1
12
M
CVE-2011-2192: inappropriate GSSAPI delegation2011-06-237.10.67.21.6
11
H
toolCVE-2010-3842: local file overwrite2010-10-137.20.07.21.1
10
H
libCVE-2010-0734: data callback excessive length2010-02-097.10.57.19.7
9
H
C
CVE-2009-2417: embedded zero in cert name2009-08-127.47.19.5
8
M
CVE-2009-0037: Arbitrary File Access2009-03-035.117.19.3
7
L
CVE-2007-3564: GnuTLS insufficient cert verification2007-07-107.14.07.16.3
6
H
C
CVE-2006-1061: TFTP Packet Buffer Overflow2006-03-207.15.07.15.2
5
H
C
CVE-2005-4077: URL Buffer Overflow2005-12-077.11.27.15.0
4
H
C
CVE-2005-3185: NTLM Buffer Overflow2005-10-137.10.67.14.1
3
H
C
CVE-2005-0490: Authentication Buffer Overflows2005-02-217.37.13.0
2
H
CVE-2003-1605: Proxy Authentication Header Information age2003-08-034.57.10.6
1
C
C
CVE-2000-0973: FTP Server Response Buffer Overflow2000-10-136.07.4

C mistakes

Flaws listed as "C mistakes" are vulnerabilities that we deem are likely to not have happened should we have used a memory-safe language rather than C. The C mistakes are divided into the following areas: OVERFLOW, OVERREAD, DOUBLE_FREE, USE_AFTER_FREE, NULL_MISTAKE, UNINIT and BAD_FREE.

Retracted security vulnerabilities

Issues no longer considered curl security problems:

Bogus security vulnerabilities

Issues filed by others that are plain lies:

curl vulnerability data

vuln.csv and vuln.json provide info about all vulnerabilities in machine friendly formats.

Each vulnerability is also provided as a single JSON that you can access at "https://curl.se/docs/$CVE.json" - replace $CVE with the actual curl CVE Id.

The JSON output follows the Open Source Vulnerability format