Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-dotnet31-curl@7.61.1-22?arch=el7_9
Typerpm
Namespaceredhat
Namerh-dotnet31-curl
Version7.61.1-22
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-ggt7-eejg-xfb6
vulnerability_id VCID-ggt7-eejg-xfb6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20928
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20987
published_at 2026-04-09T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-11T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21131
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21078
published_at 2026-04-02T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20845
published_at 2026-04-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-08T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30201
published_at 2026-04-12T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30106
published_at 2026-04-21T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30149
published_at 2026-04-18T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30169
published_at 2026-04-16T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30153
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
2
reference_url https://curl.se/docs/CVE-2021-22876.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://curl.se/docs/CVE-2021-22876.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1101882
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://hackerone.com/reports/1101882
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
reference_id 1941964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
reference_id 2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
reference_id 986269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
16
reference_url https://security.archlinux.org/AVG-1753
reference_id AVG-1753
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1753
17
reference_url https://security.archlinux.org/AVG-1754
reference_id AVG-1754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1754
18
reference_url https://security.archlinux.org/AVG-1755
reference_id AVG-1755
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1755
19
reference_url https://security.archlinux.org/AVG-1756
reference_id AVG-1756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1756
20
reference_url https://security.archlinux.org/AVG-1757
reference_id AVG-1757
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1757
21
reference_url https://security.archlinux.org/AVG-1758
reference_id AVG-1758
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1758
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
reference_id CVE-2021-22876
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
23
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.gentoo.org/glsa/202105-36
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
reference_id ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
reference_id KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
27
reference_url https://security.netapp.com/advisory/ntap-20210521-0007/
reference_id ntap-20210521-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.netapp.com/advisory/ntap-20210521-0007/
28
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
29
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
30
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
31
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
32
reference_url https://usn.ubuntu.com/4898-1/
reference_id USN-4898-1
reference_type
scores
url https://usn.ubuntu.com/4898-1/
33
reference_url https://usn.ubuntu.com/4903-1/
reference_id USN-4903-1
reference_type
scores
url https://usn.ubuntu.com/4903-1/
fixed_packages
aliases CVE-2021-22876
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6
1
url VCID-sh5a-fmna-wffr
vulnerability_id VCID-sh5a-fmna-wffr
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22946
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19491
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19479
published_at 2026-04-18T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23261
published_at 2026-04-12T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.2322
published_at 2026-04-16T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23322
published_at 2026-04-02T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23204
published_at 2026-04-13T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23365
published_at 2026-04-04T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23154
published_at 2026-04-07T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23227
published_at 2026-04-08T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23277
published_at 2026-04-09T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23299
published_at 2026-04-11T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23143
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22946
2
reference_url https://curl.se/docs/CVE-2021-22946.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22946.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1334111
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://hackerone.com/reports/1334111
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589
reference_id 1017589
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2003175
reference_id 2003175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2003175
22
reference_url http://seclists.org/fulldisclosure/2022/Mar/29
reference_id 29
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url http://seclists.org/fulldisclosure/2022/Mar/29
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
reference_id APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
24
reference_url https://security.archlinux.org/AVG-2384
reference_id AVG-2384
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2384
25
reference_url https://security.archlinux.org/AVG-2385
reference_id AVG-2385
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2385
26
reference_url https://security.archlinux.org/AVG-2386
reference_id AVG-2386
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2386
27
reference_url https://security.archlinux.org/AVG-2387
reference_id AVG-2387
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2387
28
reference_url https://security.archlinux.org/AVG-2388
reference_id AVG-2388
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2388
29
reference_url https://security.archlinux.org/AVG-2389
reference_id AVG-2389
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2389
30
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://www.debian.org/security/2022/dsa-5197
31
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://security.gentoo.org/glsa/202212-01
32
reference_url https://support.apple.com/kb/HT213183
reference_id HT213183
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://support.apple.com/kb/HT213183
33
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
34
reference_url https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
35
reference_url https://security.netapp.com/advisory/ntap-20211029-0003/
reference_id ntap-20211029-0003
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://security.netapp.com/advisory/ntap-20211029-0003/
36
reference_url https://security.netapp.com/advisory/ntap-20220121-0008/
reference_id ntap-20220121-0008
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://security.netapp.com/advisory/ntap-20220121-0008/
37
reference_url https://access.redhat.com/errata/RHSA-2021:4059
reference_id RHSA-2021:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4059
38
reference_url https://access.redhat.com/errata/RHSA-2022:0635
reference_id RHSA-2022:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0635
39
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
reference_id RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
41
reference_url https://usn.ubuntu.com/5079-1/
reference_id USN-5079-1
reference_type
scores
url https://usn.ubuntu.com/5079-1/
42
reference_url https://usn.ubuntu.com/5079-2/
reference_id USN-5079-2
reference_type
scores
url https://usn.ubuntu.com/5079-2/
fixed_packages
aliases CVE-2021-22946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh5a-fmna-wffr
2
url VCID-t4gn-9fw8-gkc3
vulnerability_id VCID-t4gn-9fw8-gkc3
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22947
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48671
published_at 2026-04-21T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48714
published_at 2026-04-18T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.486
published_at 2026-04-01T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48669
published_at 2026-04-13T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.48641
published_at 2026-04-02T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48718
published_at 2026-04-16T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48662
published_at 2026-04-04T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48614
published_at 2026-04-07T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48668
published_at 2026-04-08T12:55:00Z
9
value 0.00253
scoring_system epss
scoring_elements 0.48665
published_at 2026-04-09T12:55:00Z
10
value 0.00253
scoring_system epss
scoring_elements 0.48683
published_at 2026-04-11T12:55:00Z
11
value 0.00253
scoring_system epss
scoring_elements 0.48657
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22947
2
reference_url https://curl.se/docs/CVE-2021-22947.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22947.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1334763
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://hackerone.com/reports/1334763
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2003191
reference_id 2003191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2003191
21
reference_url http://seclists.org/fulldisclosure/2022/Mar/29
reference_id 29
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url http://seclists.org/fulldisclosure/2022/Mar/29
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
reference_id APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
23
reference_url https://security.archlinux.org/AVG-2384
reference_id AVG-2384
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2384
24
reference_url https://security.archlinux.org/AVG-2385
reference_id AVG-2385
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2385
25
reference_url https://security.archlinux.org/AVG-2386
reference_id AVG-2386
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2386
26
reference_url https://security.archlinux.org/AVG-2387
reference_id AVG-2387
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2387
27
reference_url https://security.archlinux.org/AVG-2388
reference_id AVG-2388
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2388
28
reference_url https://security.archlinux.org/AVG-2389
reference_id AVG-2389
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2389
29
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://www.debian.org/security/2022/dsa-5197
30
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://security.gentoo.org/glsa/202212-01
31
reference_url https://support.apple.com/kb/HT213183
reference_id HT213183
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://support.apple.com/kb/HT213183
32
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
33
reference_url https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
34
reference_url https://security.netapp.com/advisory/ntap-20211029-0003/
reference_id ntap-20211029-0003
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://security.netapp.com/advisory/ntap-20211029-0003/
35
reference_url https://access.redhat.com/errata/RHSA-2021:4059
reference_id RHSA-2021:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4059
36
reference_url https://access.redhat.com/errata/RHSA-2022:0635
reference_id RHSA-2022:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0635
37
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
reference_id RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
39
reference_url https://usn.ubuntu.com/5079-1/
reference_id USN-5079-1
reference_type
scores
url https://usn.ubuntu.com/5079-1/
40
reference_url https://usn.ubuntu.com/5079-2/
reference_id USN-5079-2
reference_type
scores
url https://usn.ubuntu.com/5079-2/
fixed_packages
aliases CVE-2021-22947
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4gn-9fw8-gkc3
3
url VCID-y32p-52ps-4ug4
vulnerability_id VCID-y32p-52ps-4ug4
summary
Use of Incorrectly-Resolved Name or Reference
libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
reference_id
reference_type
scores
0
value 0.00746
scoring_system epss
scoring_elements 0.73012
published_at 2026-04-01T12:55:00Z
1
value 0.00746
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-08T12:55:00Z
2
value 0.00746
scoring_system epss
scoring_elements 0.73066
published_at 2026-04-09T12:55:00Z
3
value 0.00746
scoring_system epss
scoring_elements 0.7311
published_at 2026-04-21T12:55:00Z
4
value 0.00746
scoring_system epss
scoring_elements 0.73117
published_at 2026-04-18T12:55:00Z
5
value 0.00746
scoring_system epss
scoring_elements 0.73107
published_at 2026-04-16T12:55:00Z
6
value 0.00746
scoring_system epss
scoring_elements 0.73064
published_at 2026-04-13T12:55:00Z
7
value 0.00746
scoring_system epss
scoring_elements 0.7307
published_at 2026-04-12T12:55:00Z
8
value 0.00746
scoring_system epss
scoring_elements 0.73091
published_at 2026-04-11T12:55:00Z
9
value 0.00746
scoring_system epss
scoring_elements 0.73042
published_at 2026-04-04T12:55:00Z
10
value 0.00746
scoring_system epss
scoring_elements 0.73021
published_at 2026-04-02T12:55:00Z
11
value 0.00746
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
2
reference_url https://curl.se/docs/CVE-2021-22924.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22924.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1223565
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://hackerone.com/reports/1223565
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
reference_id 1981460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
reference_id 991492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
22
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
23
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
24
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
25
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
26
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
27
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
28
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
29
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
30
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
31
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
32
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
33
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
reference_id CVE-2021-22924
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
35
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://www.debian.org/security/2022/dsa-5197
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
37
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
38
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
39
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
40
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
44
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
45
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
46
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
47
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
reference_id ssa-732250.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
48
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
fixed_packages
aliases CVE-2021-22924
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-dotnet31-curl@7.61.1-22%3Farch=el7_9