Haxx Vulnerabilities
Comprehensive security vulnerability database for Haxx products
10
1
10
4
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3805 | 7.5 | This vulnerability allows an attacker to potentially execute arbitrary code on a system using curl when making a second SMB request to the same host, due to the software mistakenly using memory that has already been freed. To exploit this, the attacker must be able to send multiple SMB requests to the same server, which could happen in certain network configurations. | haxxcurl | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2026-3784 | 6.5 | This vulnerability allows an attacker to potentially gain access to sensitive information by reusing an existing HTTP proxy connection, even if the new request uses different login credentials. This issue occurs when the curl tool fails to establish a separate connection for requests that require different authentication, which could lead to unauthorized data exposure if an attacker can control the proxy or its traffic. | haxxcurl | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2026-3783 | 5.3 | This vulnerability allows an attacker to potentially capture an OAuth2 bearer token when a user is redirected from one website to another, exposing sensitive information. This can happen if the second website has credentials stored in the user's .netrc file, which curl mistakenly sends along with the token. | haxxcurl | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2026-1965 | 6.5 | This vulnerability allows an attacker to potentially access sensitive information by reusing an existing connection that was authenticated with different user credentials, leading to unauthorized actions. This can happen if an application makes multiple requests to the same server using Negotiate authentication, where the first request is authenticated with one user's credentials and the second request mistakenly uses that same connection, thinking it's authenticated with a different user's credentials. | haxxcurl | Exploit Available | 27 days agoMar 11, 2026 |
| CVE-2023-28322 | 3.7 | This vulnerability allows an attacker to potentially send incorrect data during an HTTP POST request if the same connection handle was previously used for a PUT request, which could lead to unexpected application behavior. It mainly affects applications that reuse connection handles without properly resetting them, making it important for developers to be cautious when switching between different types of requests. | haxxcurl | Exploit Available | almost 3 years agoMay 26, 2023 |
| CVE-2023-27533 | 8.8 | An attacker can exploit a vulnerability in curl to send malicious commands during TELNET communication, potentially allowing them to execute arbitrary code on the system. This can happen if an application using curl accepts user input without properly checking it, making it particularly risky for applications that rely on user-provided data. | haxxcurl | Exploit Available | about 3 years agoMar 30, 2023 |
| CVE-2023-23915 | 6.5 | This vulnerability allows an attacker to potentially intercept sensitive information during data transfers because the curl tool may fail to upgrade certain HTTP requests to secure HTTPS when multiple requests are made at the same time. This issue occurs only when using curl versions prior to 7.88.0 and can lead to unprotected data being sent over the internet instead of the intended secure connection. | haxxcurl | Exploit Available | about 3 years agoFeb 23, 2023 |
| CVE-2022-43551 | 7.5 | An attacker can trick curl into using an insecure HTTP connection instead of the intended secure HTTPS by manipulating the URL with special characters that confuse the software's security checks. This vulnerability occurs when the URL contains IDN characters that are converted to ASCII, allowing the attacker to bypass the HSTS protection that should enforce secure connections. | haxxcurl | Exploit Available | over 3 years agoDec 23, 2022 |
| CVE-2022-32221 | 9.8 | This vulnerability allows an attacker to manipulate data sent in a POST request by exploiting a flaw in how the curl library handles reused connections, potentially leading to the wrong data being sent or causing the application to crash. It occurs when a connection that was previously used for a PUT request is reused for a POST request without properly resetting the data handling, which could happen in applications that frequently switch between these types of requests. | haxxcurl | Exploit Available | over 3 years agoDec 5, 2022 |
| CVE-2022-42916 | 7.5 | This vulnerability allows an attacker to trick curl into using an insecure HTTP connection instead of the intended secure HTTPS connection by manipulating the URL with special characters. This can happen when the URL includes international domain names that get converted to ASCII, making it possible for the attacker to bypass security checks designed to enforce HTTPS. | haxxcurl | Exploit Available | over 3 years agoOct 29, 2022 |
About Haxx Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Haxx products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.