Lookup for vulnerable packages by Package URL.

GET /api/packages/1067521?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "curl",
    "version": "8.20.0~rc2-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69487?format=api",
            "vulnerability_id": "VCID-176a-agbw-hqdy",
            "summary": "curl: libcurl: QUIC Certificate Pinning Bypass",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5025.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5025.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18854",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19078",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19129",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18846",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18926",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18979",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18986",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18939",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18888",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18841",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5025"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-5025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-5025.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3153497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3153497"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368888",
                    "reference_id": "2368888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368888"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2887",
                    "reference_id": "AVG-2887",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2887"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-5025.json",
                    "reference_id": "CVE-2025-5025.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-5025.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585168?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-5025"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-176a-agbw-hqdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49272?format=api",
            "vulnerability_id": "VCID-1k8f-qgcv-xkhb",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64558",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64484",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64515",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64472",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6452",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64536",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64552",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6454",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64512",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00469",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64546",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27782"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27782.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27782.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1555796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1555796"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082215",
                    "reference_id": "2082215",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082215"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/03/20/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/03/20/6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0009/",
                    "reference_id": "ntap-20220609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5412-1/",
                    "reference_id": "USN-5412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5412-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582920?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27782"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49714?format=api",
            "vulnerability_id": "VCID-1mf9-u8y1-zbb1",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7019",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70084",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70096",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70111",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70088",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70135",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70151",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70175",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7016",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00624",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70147",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00763",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7342",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000101"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20170809A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20170809A.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-1000101.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-1000101.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://support.apple.com/HT208221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"
                        }
                    ],
                    "url": "https://support.apple.com/HT208221"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3992"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/100249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/100249"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039117"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478309",
                    "reference_id": "1478309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478309"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554",
                    "reference_id": "871554",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201708-16",
                    "reference_id": "ASA-201708-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201708-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-370",
                    "reference_id": "AVG-370",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-370"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000101",
                    "reference_id": "CVE-2017-1000101",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000101"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-14",
                    "reference_id": "GLSA-201709-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-1/",
                    "reference_id": "USN-3441-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585811?format=api",
                    "purl": "pkg:deb/debian/curl@7.55.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.55.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000101"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1mf9-u8y1-zbb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49715?format=api",
            "vulnerability_id": "VCID-26ju-84rx-c7b9",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7407",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51184",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51472",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51523",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51549",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51509",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51563",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5156",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51604",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51583",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51572",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51614",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7407"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-7407.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-7407.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "2.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439190",
                    "reference_id": "1439190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439190"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500",
                    "reference_id": "859500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7407",
                    "reference_id": "CVE-2017-7407",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "2.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7407"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-14",
                    "reference_id": "GLSA-201709-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-1/",
                    "reference_id": "USN-3441-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-2/",
                    "reference_id": "USN-3441-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586791?format=api",
                    "purl": "pkg:deb/debian/curl@7.52.1-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7407"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71915?format=api",
            "vulnerability_id": "VCID-26p8-15d6-kbb1",
            "summary": "libcurl: Double Close of Eventfd in libcurl",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0665.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0665.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0665",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8922",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89179",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89182",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.892",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89204",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89214",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8921",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89208",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89221",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04569",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89164",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0665"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-0665.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-0665.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2954286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2954286"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2343895",
                    "reference_id": "2343895",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2343895"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-0665.json",
                    "reference_id": "CVE-2025-0665.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-0665.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582847?format=api",
                    "purl": "pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-0665"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26p8-15d6-kbb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34392?format=api",
            "vulnerability_id": "VCID-29n1-4u2b-tkgj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32009",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31828",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31913",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31909",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31838",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31967",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3713",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37101",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37148",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16842"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-16842.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-16842.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1042014",
                    "reference_id": "1042014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1042014"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644124",
                    "reference_id": "1644124",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644124"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-4",
                    "reference_id": "ASA-201811-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-795",
                    "reference_id": "AVG-795",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-795"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2018-16842.html",
                    "reference_id": "CVE-2018-16842.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2018-16842.html"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211",
                    "reference_id": "d530e92f59ae9bb2d47066c3c460b25d2ffeb211",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4331",
                    "reference_id": "dsa-4331",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4331"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-03",
                    "reference_id": "GLSA-201903-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2181",
                    "reference_id": "RHSA-2019:2181",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2181"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842",
                    "reference_id": "show_bug.cgi?id=CVE-2018-16842",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3805-1/",
                    "reference_id": "USN-3805-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3805-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3805-2/",
                    "reference_id": "USN-3805-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3805-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583784?format=api",
                    "purl": "pkg:deb/debian/curl@7.62.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-16842"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-29n1-4u2b-tkgj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47223?format=api",
            "vulnerability_id": "VCID-2b39-ubrt-hkc6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11139",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93447",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11139",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93455",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11139",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93456",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11139",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93439",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11139",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93473",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.11139",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93467",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11139",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93464",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.13273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.13273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.13273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94181",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5436"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2019-5436.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2019-5436.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/550696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/550696"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710620",
                    "reference_id": "1710620",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710620"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/09/11/6",
                    "reference_id": "6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/09/11/6"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351",
                    "reference_id": "929351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-11",
                    "reference_id": "ASA-201905-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-12",
                    "reference_id": "ASA-201905-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-13",
                    "reference_id": "ASA-201905-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-14",
                    "reference_id": "ASA-201905-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-15",
                    "reference_id": "ASA-201905-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-16",
                    "reference_id": "ASA-201905-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-959",
                    "reference_id": "AVG-959",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-959"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-960",
                    "reference_id": "AVG-960",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-960"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-961",
                    "reference_id": "AVG-961",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-961"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-962",
                    "reference_id": "AVG-962",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-962"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-963",
                    "reference_id": "AVG-963",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-963"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-964",
                    "reference_id": "AVG-964",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-964"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2019-5436.html",
                    "reference_id": "CVE-2019-5436.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2019-5436.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-29",
                    "reference_id": "GLSA-202003-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202003-29"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K55133295",
                    "reference_id": "K55133295",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K55133295"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS",
                    "reference_id": "K55133295?utm_source=f5support&amp%3Butm_medium=RSS",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html",
                    "reference_id": "msg00008.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190606-0004/",
                    "reference_id": "ntap-20190606-0004",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190606-0004/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1020",
                    "reference_id": "RHSA-2020:1020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1792",
                    "reference_id": "RHSA-2020:1792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2505",
                    "reference_id": "RHSA-2020:2505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2505"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/",
                    "reference_id": "SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3993-1/",
                    "reference_id": "USN-3993-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3993-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3993-2/",
                    "reference_id": "USN-3993-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3993-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584375?format=api",
                    "purl": "pkg:deb/debian/curl@7.64.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-5436"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2b39-ubrt-hkc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64301?format=api",
            "vulnerability_id": "VCID-2cx5-1qnw-uufj",
            "summary": "curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17246",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17194",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16802",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16949",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16923",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19232",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19316",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19261",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19223",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-1965"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-1965.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-1965.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446448",
                    "reference_id": "2446448",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446448"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-1965.json",
                    "reference_id": "CVE-2026-1965.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-1965.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8084-1/",
                    "reference_id": "USN-8084-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8084-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8099-1/",
                    "reference_id": "USN-8099-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8099-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921946?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0~rc3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0~rc3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-1965"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60689?format=api",
            "vulnerability_id": "VCID-2f5z-vxsz-yqdv",
            "summary": "A vulnerability in cURL may allow for arbitrary file access.",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20090303.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20090303.html"
                },
                {
                    "reference_url": "http://curl.haxx.se/lxr/source/CHANGES",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/lxr/source/CHANGES"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"
                },
                {
                    "reference_url": "http://lists.vmware.com/pipermail/security-announce/2009/000060.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.vmware.com/pipermail/security-announce/2009/000060.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92861",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9286",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92823",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9283",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92832",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92841",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92845",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09542",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9285",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0037"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2009-0037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2009-0037.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34138"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34202"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34237"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34251",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34251"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34255"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34259"
                },
                {
                    "reference_url": "http://secunia.com/advisories/34399",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/34399"
                },
                {
                    "reference_url": "http://secunia.com/advisories/35766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/35766"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-200903-21.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.gentoo.org/glsa/glsa-200903-21.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49030"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT4077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://support.apple.com/kb/HT4077"
                },
                {
                    "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042"
                },
                {
                    "reference_url": "http://www.debian.org/security/2009/dsa-1738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2009/dsa-1738"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0341.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2009-0341.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/501757/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/501757/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/504849/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/504849/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/33962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/33962"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021783"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-726-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-726-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2009-0009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2009-0009.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/0581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/0581"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2009/1865",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2009/1865"
                },
                {
                    "reference_url": "http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/"
                },
                {
                    "reference_url": "http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=485271",
                    "reference_id": "485271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485271"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423",
                    "reference_id": "518423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0037",
                    "reference_id": "CVE-2009-0037",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0037"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt",
                    "reference_id": "CVE-2009-0037;OSVDB-53572",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/33962/info",
                    "reference_id": "CVE-2009-0037;OSVDB-53572",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/33962/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200903-21",
                    "reference_id": "GLSA-200903-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200903-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:0341",
                    "reference_id": "RHSA-2009:0341",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:0341"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/726-1/",
                    "reference_id": "USN-726-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/726-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585689?format=api",
                    "purl": "pkg:deb/debian/curl@7.18.2-8.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.18.2-8.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-0037"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2f5z-vxsz-yqdv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77132?format=api",
            "vulnerability_id": "VCID-2szj-xvgq-pkfr",
            "summary": "curl: QUIC certificate check bypass with wolfSSL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2379.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2379.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42724",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42672",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42641",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42704",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42726",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42691",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42674",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00205",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42735",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2379"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2379",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2379"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18",
                    "reference_id": "18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/18"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/19"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/2"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270499",
                    "reference_id": "2270499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270499"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2410774",
                    "reference_id": "2410774",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2410774"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2379.html",
                    "reference_id": "CVE-2024-2379.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2379.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2379.json",
                    "reference_id": "CVE-2024-2379.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2379.json"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214118",
                    "reference_id": "HT214118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214118"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214119",
                    "reference_id": "HT214119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214119"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214120",
                    "reference_id": "HT214120",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214120"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0001/",
                    "reference_id": "ntap-20240531-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240531-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2693",
                    "reference_id": "RHSA-2024:2693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2694",
                    "reference_id": "RHSA-2024:2694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2694"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584796?format=api",
                    "purl": "pkg:deb/debian/curl@8.7.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2379"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2szj-xvgq-pkfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47213?format=api",
            "vulnerability_id": "VCID-2vwu-y316-gbb2",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35468",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35517",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35542",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35424",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3547",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35495",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35505",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35462",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3544",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35479",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2466"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18",
                    "reference_id": "18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/18"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270497",
                    "reference_id": "2270497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270497"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2416725",
                    "reference_id": "2416725",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2416725"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2466.html",
                    "reference_id": "CVE-2024-2466.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2466.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2466.json",
                    "reference_id": "CVE-2024-2466.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2466.json"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-20",
                    "reference_id": "GLSA-202409-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-20"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214118",
                    "reference_id": "HT214118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214118"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214119",
                    "reference_id": "HT214119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214119"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214120",
                    "reference_id": "HT214120",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214120"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240503-0010/",
                    "reference_id": "ntap-20240503-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240503-0010/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2693",
                    "reference_id": "RHSA-2024:2693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2694",
                    "reference_id": "RHSA-2024:2694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2694"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584796?format=api",
                    "purl": "pkg:deb/debian/curl@8.7.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2466"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vwu-y316-gbb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49279?format=api",
            "vulnerability_id": "VCID-2xmp-jc8v-bucb",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43804",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43787",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43779",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43736",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5236",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52298",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52348",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52332",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52318",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52356",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35252"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-35252.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-35252.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1613943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1613943"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831",
                    "reference_id": "1018831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718",
                    "reference_id": "2120718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2120718"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213603",
                    "reference_id": "HT213603",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213603"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220930-0005/",
                    "reference_id": "ntap-20220930-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220930-0005/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2478",
                    "reference_id": "RHSA-2023:2478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2963",
                    "reference_id": "RHSA-2023:2963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2963"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0428",
                    "reference_id": "RHSA-2024:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0428"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5587-1/",
                    "reference_id": "USN-5587-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5587-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585554?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585555?format=api",
                    "purl": "pkg:deb/debian/curl@7.85.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.85.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-35252"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49716?format=api",
            "vulnerability_id": "VCID-36n6-qanf-nue8",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7468.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7468.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65949",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66073",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65991",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66019",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65986",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66036",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66048",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66054",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66024",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66059",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7468"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20170419.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_20170419.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-7468.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-7468.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/97962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/97962"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038341"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443381",
                    "reference_id": "1443381",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443381"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201704-12",
                    "reference_id": "ASA-201704-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201704-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-180",
                    "reference_id": "AVG-180",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-180"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-181",
                    "reference_id": "AVG-181",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-181"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-183",
                    "reference_id": "AVG-183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-183"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-184",
                    "reference_id": "AVG-184",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-184"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-241",
                    "reference_id": "AVG-241",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-241"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-243",
                    "reference_id": "AVG-243",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-243"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7468",
                    "reference_id": "CVE-2017-7468",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7468"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-14",
                    "reference_id": "GLSA-201709-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201709-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3262-1/",
                    "reference_id": "USN-3262-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3262-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585386?format=api",
                    "purl": "pkg:deb/debian/curl@7.52.1-5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7468"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36n6-qanf-nue8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61670?format=api",
            "vulnerability_id": "VCID-38mv-usbe-z7hd",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22901.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22901.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56921",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57062",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57081",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5706",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57036",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57065",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57018",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5704",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57017",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57068",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22901"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22901.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22901.html"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1180380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1180380"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963146",
                    "reference_id": "1963146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1963146"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-4",
                    "reference_id": "ASA-202106-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-5",
                    "reference_id": "ASA-202106-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-6",
                    "reference_id": "ASA-202106-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-7",
                    "reference_id": "ASA-202106-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1995",
                    "reference_id": "AVG-1995",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1995"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1996",
                    "reference_id": "AVG-1996",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1996"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1997",
                    "reference_id": "AVG-1997",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1997"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1998",
                    "reference_id": "AVG-1998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1998"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-36",
                    "reference_id": "GLSA-202105-36",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-36"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2471",
                    "reference_id": "RHSA-2021:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2472",
                    "reference_id": "RHSA-2021:2472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2472"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22901"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38mv-usbe-z7hd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49266?format=api",
            "vulnerability_id": "VCID-3sy2-4f3g-zkac",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53855",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53749",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53775",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53748",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53799",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53847",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5383",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53814",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53851",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27774"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27774.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27774.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1543773",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1543773"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254",
                    "reference_id": "1010254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077547",
                    "reference_id": "2077547",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077547"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0008/",
                    "reference_id": "ntap-20220609-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582659?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27774"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57268?format=api",
            "vulnerability_id": "VCID-47qb-2qkw-1qej",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53064",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52966",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52991",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52959",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53009",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53003",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53052",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53037",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5302",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00297",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53057",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28321"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-28321.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-28321.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1950627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1950627"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239",
                    "reference_id": "1036239",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196786",
                    "reference_id": "2196786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196786"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/47",
                    "reference_id": "47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/47"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/48",
                    "reference_id": "48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/48"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/52",
                    "reference_id": "52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/52"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/",
                    "reference_id": "F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213843",
                    "reference_id": "HT213843",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213843"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213844",
                    "reference_id": "HT213844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213844"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213845",
                    "reference_id": "HT213845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213845"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html",
                    "reference_id": "msg00016.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
                    "reference_id": "ntap-20230609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230609-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4354",
                    "reference_id": "RHSA-2023:4354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4523",
                    "reference_id": "RHSA-2023:4523",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4523"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4628",
                    "reference_id": "RHSA-2023:4628",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4628"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4629",
                    "reference_id": "RHSA-2023:4629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4629"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5598",
                    "reference_id": "RHSA-2023:5598",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5598"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6292",
                    "reference_id": "RHSA-2023:6292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6292"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6237-1/",
                    "reference_id": "USN-6237-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6237-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6237-3/",
                    "reference_id": "USN-6237-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6237-3/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/",
                    "reference_id": "Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583791?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583792?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-28321"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56919?format=api",
            "vulnerability_id": "VCID-4drq-2td7-akbk",
            "summary": "cURL is vulnerable to a buffer overflow which could lead to the execution\n    of arbitrary code.",
            "references": [
                {
                    "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
                },
                {
                    "reference_url": "http://docs.info.apple.com/article.html?artnum=302847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://docs.info.apple.com/article.html?artnum=302847"
                },
                {
                    "reference_url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89555",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89504",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89519",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8952",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89536",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89547",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3185"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2005-3185.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2005-3185.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17192"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17193"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17203"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17208"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17228",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17228"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17247"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17297",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17297"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17320"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17400"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17403"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17485"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17813"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17965"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19193"
                },
                {
                    "reference_url": "http://securityreason.com/securityalert/82",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securityreason.com/securityalert/82"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1015056",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1015056"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1015057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1015057"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
                },
                {
                    "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-919",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-919"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
                },
                {
                    "reference_url": "http://www.osvdb.org/20011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/20011"
                },
                {
                    "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
                },
                {
                    "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-807.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-812.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15102"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15647"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2088",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2088"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2125"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2659",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2659"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617794",
                    "reference_id": "1617794",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617794"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734",
                    "reference_id": "333734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3185",
                    "reference_id": "CVE-2005-3185",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3185"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200510-19",
                    "reference_id": "GLSA-200510-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200510-19"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:807",
                    "reference_id": "RHSA-2005:807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:812",
                    "reference_id": "RHSA-2005:812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:812"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/205-1/",
                    "reference_id": "USN-205-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/205-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586648?format=api",
                    "purl": "pkg:deb/debian/curl@7.15.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-3185"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4drq-2td7-akbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57260?format=api",
            "vulnerability_id": "VCID-4e1k-7bj9-hfch",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23914.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23914.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32048",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32088",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31911",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31963",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31992",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31995",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31955",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31922",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23914"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-23914.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-23914.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1813864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1813864"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371",
                    "reference_id": "1031371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167797",
                    "reference_id": "2167797",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167797"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
                    "reference_id": "ntap-20230309-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230309-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354",
                    "reference_id": "RHSA-2023:3354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355",
                    "reference_id": "RHSA-2023:3355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3355"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5891-1/",
                    "reference_id": "USN-5891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586101?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-23914"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4e1k-7bj9-hfch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57261?format=api",
            "vulnerability_id": "VCID-4gze-cwtp-2bgr",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23915.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23915.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13749",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14033",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13836",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13973",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1393",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13894",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13846",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13754",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13978",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23915"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-23915.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-23915.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1814333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1814333"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371",
                    "reference_id": "1031371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167813",
                    "reference_id": "2167813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167813"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:46:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
                    "reference_id": "ntap-20230309-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:46:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230309-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354",
                    "reference_id": "RHSA-2023:3354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355",
                    "reference_id": "RHSA-2023:3355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3355"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5891-1/",
                    "reference_id": "USN-5891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586101?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-23915"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4gze-cwtp-2bgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46649?format=api",
            "vulnerability_id": "VCID-4mcy-vzmg-mbhz",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0036.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0036.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93209",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93159",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93168",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93173",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93171",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93179",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93184",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93189",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93187",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93188",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93204",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0036"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2012-0036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2012-0036.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0036"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=773457",
                    "reference_id": "773457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773457"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-02",
                    "reference_id": "GLSA-201203-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1346-1/",
                    "reference_id": "USN-1346-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1346-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582527?format=api",
                    "purl": "pkg:deb/debian/curl@7.24.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.24.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-0036"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mcy-vzmg-mbhz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51947?format=api",
            "vulnerability_id": "VCID-4mk9-5buz-puh5",
            "summary": "Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78957",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78884",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78891",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78919",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78902",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78927",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78933",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78956",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78941",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78931",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7896",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0139"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-0139.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-0139.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079149",
                    "reference_id": "1079149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079149"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728",
                    "reference_id": "742728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-21",
                    "reference_id": "GLSA-201406-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-21"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2167-1/",
                    "reference_id": "USN-2167-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2167-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585465?format=api",
                    "purl": "pkg:deb/debian/curl@7.36.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.36.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-0139"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk9-5buz-puh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47209?format=api",
            "vulnerability_id": "VCID-4seq-hvbx-7fg8",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42434",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42478",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4241",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42459",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44723",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44703",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44716",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44713",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4466",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46219"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-46219.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-46219.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2236133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2236133"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057645",
                    "reference_id": "1057645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057645"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252034",
                    "reference_id": "2252034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252034"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5587",
                    "reference_id": "dsa-5587",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5587"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-20",
                    "reference_id": "GLSA-202409-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-20"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240119-0007/",
                    "reference_id": "ntap-20240119-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240119-0007/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1316",
                    "reference_id": "RHSA-2024:1316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1317",
                    "reference_id": "RHSA-2024:1317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1317"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/",
                    "reference_id": "UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6535-1/",
                    "reference_id": "USN-6535-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6535-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/587037?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/587038?format=api",
                    "purl": "pkg:deb/debian/curl@8.5.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.5.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-46219"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4seq-hvbx-7fg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49712?format=api",
            "vulnerability_id": "VCID-549m-sm8g-cude",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000099.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000099.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000099",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72962",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7307",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72974",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72994",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7297",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73007",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73021",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73046",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73025",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73019",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00744",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73061",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000099"
                },
                {
                    "reference_url": "https://curl.haxx.se/0809C.patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/0809C.patch"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20170809C.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_20170809C.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-1000099.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-1000099.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/100281",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/100281"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1039119"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478316",
                    "reference_id": "1478316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478316"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201708-16",
                    "reference_id": "ASA-201708-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201708-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-3",
                    "reference_id": "ASA-201710-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-4",
                    "reference_id": "ASA-201710-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-5",
                    "reference_id": "ASA-201710-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-6",
                    "reference_id": "ASA-201710-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-7",
                    "reference_id": "ASA-201710-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-370",
                    "reference_id": "AVG-370",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-370"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-371",
                    "reference_id": "AVG-371",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-371"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-386",
                    "reference_id": "AVG-386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-387",
                    "reference_id": "AVG-387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-388",
                    "reference_id": "AVG-388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-389",
                    "reference_id": "AVG-389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-389"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000099",
                    "reference_id": "CVE-2017-1000099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000099"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-14",
                    "reference_id": "GLSA-201709-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201709-14"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000099"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-549m-sm8g-cude"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49259?format=api",
            "vulnerability_id": "VCID-56wg-yafz-gkgx",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34891",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35035",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35115",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34995",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35039",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35067",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35071",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35012",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3505",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22922"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22922.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22922.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1213175",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1213175"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981435",
                    "reference_id": "1981435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981435"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-59",
                    "reference_id": "ASA-202107-59",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-59"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2194",
                    "reference_id": "AVG-2194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2194"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210902-0003/",
                    "reference_id": "ntap-20210902-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E",
                    "reference_id": "r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E",
                    "reference_id": "r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E",
                    "reference_id": "rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E",
                    "reference_id": "rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3582",
                    "reference_id": "RHSA-2021:3582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3903",
                    "reference_id": "RHSA-2021:3903",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3903"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584001?format=api",
                    "purl": "pkg:deb/debian/curl@7.79.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22922"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64428?format=api",
            "vulnerability_id": "VCID-5g4v-dyse-uucu",
            "summary": "wcurl: wcurl: Arbitrary file placement via crafted URLs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11563.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11563.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11563",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0412",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04116",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04201",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0418",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04163",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04137",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04108",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04138",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04155",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04186",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-11563"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442571",
                    "reference_id": "2442571",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2442571"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-11563.html",
                    "reference_id": "CVE-2025-11563.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T18:53:51Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-11563.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-11563.json",
                    "reference_id": "CVE-2025-11563.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T18:53:51Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-11563.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584612?format=api",
                    "purl": "pkg:deb/debian/curl@8.17.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.17.0-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-11563"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5g4v-dyse-uucu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34703?format=api",
            "vulnerability_id": "VCID-5jan-pqf6-fyhr",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81845",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81915",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81911",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81947",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81856",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81875",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81908",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81927",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8622"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8622.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8622.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386",
                    "reference_id": "1388386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94105",
                    "reference_id": "94105",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94105"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102H.html",
                    "reference_id": "adv_20161102H.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102H.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8622",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8622"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34390?format=api",
            "vulnerability_id": "VCID-5n7a-9j23-e7dj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52577",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52709",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52659",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52613",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52647",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5262",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58532",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58515",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58495",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00365",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58527",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16839"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-16839.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-16839.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1042012",
                    "reference_id": "1042012",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1042012"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642201",
                    "reference_id": "1642201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642201"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-7",
                    "reference_id": "ASA-201811-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-8",
                    "reference_id": "ASA-201811-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-9",
                    "reference_id": "ASA-201811-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-796",
                    "reference_id": "AVG-796",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-796"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-797",
                    "reference_id": "AVG-797",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-797"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-798",
                    "reference_id": "AVG-798",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-798"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2018-16839.html",
                    "reference_id": "CVE-2018-16839.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2018-16839.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4331",
                    "reference_id": "dsa-4331",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4331"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5",
                    "reference_id": "f3a24d7916b9173c69a3e0ee790102993833d6c5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-03",
                    "reference_id": "GLSA-201903-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-03"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839",
                    "reference_id": "show_bug.cgi?id=CVE-2018-16839",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3805-1/",
                    "reference_id": "USN-3805-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3805-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583784?format=api",
                    "purl": "pkg:deb/debian/curl@7.62.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-16839"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5n7a-9j23-e7dj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97810?format=api",
            "vulnerability_id": "VCID-5xp7-mcsa-uqd4",
            "summary": "When doing TLS related transfers with reused easy or multi handles and\naltering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user's wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14819.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14819.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13995",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13766",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13938",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13948",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13911",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13863",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13771",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1405",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13854",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14819"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-14819.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T15:00:02Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-14819.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426408",
                    "reference_id": "2426408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426408"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-14819.json",
                    "reference_id": "CVE-2025-14819.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T15:00:02Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-14819.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921944?format=api",
                    "purl": "pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-14819"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xp7-mcsa-uqd4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49269?format=api",
            "vulnerability_id": "VCID-6ge5-86tg-dydf",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50737",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50728",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50705",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50731",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50654",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5068",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50635",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50686",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27779"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27779.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27779.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1553301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1553301"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082202",
                    "reference_id": "2082202",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082202"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582920?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27779"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ge5-86tg-dydf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34697?format=api",
            "vulnerability_id": "VCID-6muy-xpdq-9kg8",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88589",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88655",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88598",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88616",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88617",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88635",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8864",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88652",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88658",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8616"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8616.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8616.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371",
                    "reference_id": "1388371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8616"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71914?format=api",
            "vulnerability_id": "VCID-6we4-n888-6qhe",
            "summary": "libcurl: Buffer Overflow in libcurl via zlib Integer Overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63314",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63305",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63322",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63306",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00442",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6327",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63815",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63788",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63823",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63772",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0725"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-0725.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-0725.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2956023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2956023"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2343899",
                    "reference_id": "2343899",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2343899"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-0725.json",
                    "reference_id": "CVE-2025-0725.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-0725.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582847?format=api",
                    "purl": "pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-0725"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49700?format=api",
            "vulnerability_id": "VCID-6yb7-t8qs-cbch",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87269",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87259",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87302",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87285",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03871",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88244",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03871",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88227",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03871",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03871",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88231",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03871",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88245",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000007"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-1000007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-1000007.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537125",
                    "reference_id": "1537125",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537125"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-20",
                    "reference_id": "ASA-201801-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-22",
                    "reference_id": "ASA-201801-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-22"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-23",
                    "reference_id": "ASA-201801-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-24",
                    "reference_id": "ASA-201801-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-24"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-25",
                    "reference_id": "ASA-201801-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-26",
                    "reference_id": "ASA-201801-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-593",
                    "reference_id": "AVG-593",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-593"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-594",
                    "reference_id": "AVG-594",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-594"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-595",
                    "reference_id": "AVG-595",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-595"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-596",
                    "reference_id": "AVG-596",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-596"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-597",
                    "reference_id": "AVG-597",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-597"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-598",
                    "reference_id": "AVG-598",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-598"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-04",
                    "reference_id": "GLSA-201804-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3554-1/",
                    "reference_id": "USN-3554-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3554-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3554-2/",
                    "reference_id": "USN-3554-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3554-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585653?format=api",
                    "purl": "pkg:deb/debian/curl@7.58.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.58.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1000007"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74464?format=api",
            "vulnerability_id": "VCID-75nw-4e2d-zqgg",
            "summary": "curl: libcurl: ASN.1 date parser overread",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7264",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00796",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00796",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73978",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00796",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00796",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73973",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75443",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75409",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75407",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00882",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75437",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7264"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/31/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/31/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656",
                    "reference_id": "1077656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888",
                    "reference_id": "2301888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2629968",
                    "reference_id": "2629968",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2629968"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-7264.html",
                    "reference_id": "CVE-2024-7264.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-7264.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-7264.json",
                    "reference_id": "CVE-2024-7264.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-7264.json"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7726",
                    "reference_id": "RHSA-2024:7726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7726"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1671",
                    "reference_id": "RHSA-2025:1671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1673",
                    "reference_id": "RHSA-2025:1673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1673"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6944-1/",
                    "reference_id": "USN-6944-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6944-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6944-2/",
                    "reference_id": "USN-6944-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6944-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583098?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583099?format=api",
                    "purl": "pkg:deb/debian/curl@8.9.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-7264"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75nw-4e2d-zqgg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34393?format=api",
            "vulnerability_id": "VCID-79sv-kzb5-hbc4",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94902",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94879",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94927",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94893",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94907",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94923",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94913",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94911",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94888",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.16566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94891",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3822"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2019-3822.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2019-3822.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2019-3822.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2019-3822.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190315-0001/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190719-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190719-0004/"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K84141449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K84141449"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2019/dsa-4386"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/106950"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670254",
                    "reference_id": "1670254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670254"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-10",
                    "reference_id": "ASA-201902-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-11",
                    "reference_id": "ASA-201902-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-12",
                    "reference_id": "ASA-201902-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-13",
                    "reference_id": "ASA-201902-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-9",
                    "reference_id": "ASA-201902-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-873",
                    "reference_id": "AVG-873",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-873"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-874",
                    "reference_id": "AVG-874",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-874"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-875",
                    "reference_id": "AVG-875",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-875"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-876",
                    "reference_id": "AVG-876",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-876"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-877",
                    "reference_id": "AVG-877",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-877"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822",
                    "reference_id": "CVE-2019-3822",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3822"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-03",
                    "reference_id": "GLSA-201903-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3701",
                    "reference_id": "RHSA-2019:3701",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3701"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3882-1/",
                    "reference_id": "USN-3882-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3882-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585517?format=api",
                    "purl": "pkg:deb/debian/curl@7.64.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-3822"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79sv-kzb5-hbc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80714?format=api",
            "vulnerability_id": "VCID-7c8e-eaqy-akeu",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92962",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92922",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9293",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92934",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92933",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92941",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9295",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92949",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0976",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9296",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3153"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2015-3153.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2015-3153.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217341",
                    "reference_id": "1217341",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217341"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2591-1/",
                    "reference_id": "USN-2591-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2591-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586312?format=api",
                    "purl": "pkg:deb/debian/curl@7.42.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3153"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7c8e-eaqy-akeu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16993?format=api",
            "vulnerability_id": "VCID-7srk-hshe-h3f4",
            "summary": "Improper Authentication\nAn authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03579",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03588",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03622",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.036",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03574",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05559",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05601",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05595",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05545",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27538"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-27538.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-27538.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1898475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1898475"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179103",
                    "reference_id": "2179103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179103"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27538",
                    "reference_id": "CVE-2023-27538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
                    "reference_id": "ntap-20230420-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230420-0010/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6679",
                    "reference_id": "RHSA-2023:6679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6679"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-1/",
                    "reference_id": "USN-5964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584288?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584289?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-27538"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7srk-hshe-h3f4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49308?format=api",
            "vulnerability_id": "VCID-7vt9-pf5q-uqb6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83858",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85931",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86003",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86013",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86027",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85968",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8602",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85957",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86025",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85984",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000301"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_2018-b138.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_2018-b138.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-1000301.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-1000301.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3598-2/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3598-2/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4202"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/104225"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575536",
                    "reference_id": "1575536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575536"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856",
                    "reference_id": "898856",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-13",
                    "reference_id": "ASA-201805-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-14",
                    "reference_id": "ASA-201805-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-15",
                    "reference_id": "ASA-201805-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-16",
                    "reference_id": "ASA-201805-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-17",
                    "reference_id": "ASA-201805-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-18",
                    "reference_id": "ASA-201805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-694",
                    "reference_id": "AVG-694",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-694"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-695",
                    "reference_id": "AVG-695",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-695"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-696",
                    "reference_id": "AVG-696",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-696"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-697",
                    "reference_id": "AVG-697",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-697"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-698",
                    "reference_id": "AVG-698",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-698"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-699",
                    "reference_id": "AVG-699",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-699"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000301",
                    "reference_id": "CVE-2018-1000301",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000301"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201806-05",
                    "reference_id": "GLSA-201806-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201806-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3648-1/",
                    "reference_id": "USN-3648-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3648-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582786?format=api",
                    "purl": "pkg:deb/debian/curl@7.60.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1000301"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vt9-pf5q-uqb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34691?format=api",
            "vulnerability_id": "VCID-7xxh-66ys-4bhw",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83461",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83561",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8356",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83488",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83487",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83511",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83521",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83529",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5419"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-5419.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-5419.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183",
                    "reference_id": "1362183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2575",
                    "reference_id": "RHSA-2016:2575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2957",
                    "reference_id": "RHSA-2016:2957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3048-1/",
                    "reference_id": "USN-3048-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3048-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584626?format=api",
                    "purl": "pkg:deb/debian/curl@7.50.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-5419"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55642?format=api",
            "vulnerability_id": "VCID-87qu-j64w-p7fj",
            "summary": "unchecked ssl certificate host name",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4545.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4545.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57757",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57618",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57702",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57699",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57754",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57772",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57751",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57731",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57761",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4545"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2013-4545.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2013-4545.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029159",
                    "reference_id": "1029159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029159"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2048-1/",
                    "reference_id": "USN-2048-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2048-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586294?format=api",
                    "purl": "pkg:deb/debian/curl@7.33.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.33.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-4545"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-87qu-j64w-p7fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74681?format=api",
            "vulnerability_id": "VCID-8m6a-ej6a-g3df",
            "summary": "curl: freeing stack buffer in utf8asn1str",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6197.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6197.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79766",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79695",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79716",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79701",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7973",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79737",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79743",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01302",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79765",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6197"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/24/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/24/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996",
                    "reference_id": "1076996",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299653",
                    "reference_id": "2299653",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299653"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2559516",
                    "reference_id": "2559516",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2559516"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/24/5",
                    "reference_id": "5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/24/5"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-6197.html",
                    "reference_id": "CVE-2024-6197.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-6197.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-6197.json",
                    "reference_id": "CVE-2024-6197.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-6197.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583078?format=api",
                    "purl": "pkg:deb/debian/curl@8.9.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-6197"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8m6a-ej6a-g3df"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64299?format=api",
            "vulnerability_id": "VCID-8zks-th64-33b8",
            "summary": "curl: curl: Unauthorized access due to improper HTTP proxy connection reuse",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03044",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03051",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03081",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03056",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03053",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03037",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03671",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03709",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03683",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03659",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3784"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-3784.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-3784.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3584903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3584903"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446449",
                    "reference_id": "2446449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446449"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-3784.json",
                    "reference_id": "CVE-2026-3784.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-3784.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8084-1/",
                    "reference_id": "USN-8084-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8084-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8099-1/",
                    "reference_id": "USN-8099-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8099-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-3784"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34391?format=api",
            "vulnerability_id": "VCID-9cbd-x468-rkaw",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00225",
                            "scoring_system": "epss",
                            "scoring_elements": "0.451",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53824",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53718",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53745",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53717",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5377",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53815",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53798",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53783",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5382",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16840"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-16840.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-16840.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1042013",
                    "reference_id": "1042013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1042013"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642203",
                    "reference_id": "1642203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642203"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f",
                    "reference_id": "81d135d67155c5295b1033679c606165d4e28f3f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-4",
                    "reference_id": "ASA-201811-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-5",
                    "reference_id": "ASA-201811-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-6",
                    "reference_id": "ASA-201811-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-7",
                    "reference_id": "ASA-201811-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-8",
                    "reference_id": "ASA-201811-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201811-9",
                    "reference_id": "ASA-201811-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201811-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-795",
                    "reference_id": "AVG-795",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-795"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-796",
                    "reference_id": "AVG-796",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-796"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-797",
                    "reference_id": "AVG-797",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-797"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-798",
                    "reference_id": "AVG-798",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-798"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-799",
                    "reference_id": "AVG-799",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-799"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-800",
                    "reference_id": "AVG-800",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-800"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2018-16840.html",
                    "reference_id": "CVE-2018-16840.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2018-16840.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-03",
                    "reference_id": "GLSA-201903-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-03"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840",
                    "reference_id": "show_bug.cgi?id=CVE-2018-16840",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3805-1/",
                    "reference_id": "USN-3805-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3805-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583784?format=api",
                    "purl": "pkg:deb/debian/curl@7.62.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-16840"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cbd-x468-rkaw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57259?format=api",
            "vulnerability_id": "VCID-9ggp-5wfj-ufcq",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42433",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42428",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42458",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42397",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42455",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42477",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42409",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43552"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-43552.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-43552.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1764858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1764858"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830",
                    "reference_id": "1026830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Mar/17",
                    "reference_id": "17",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Mar/17"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152652",
                    "reference_id": "2152652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152652"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213670",
                    "reference_id": "HT213670",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213670"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230214-0002/",
                    "reference_id": "ntap-20230214-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230214-0002/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2478",
                    "reference_id": "RHSA-2023:2478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2478"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2963",
                    "reference_id": "RHSA-2023:2963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2963"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354",
                    "reference_id": "RHSA-2023:3354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355",
                    "reference_id": "RHSA-2023:3355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3355"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7743",
                    "reference_id": "RHSA-2023:7743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0428",
                    "reference_id": "RHSA-2024:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0428"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5788-1/",
                    "reference_id": "USN-5788-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5788-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5894-1/",
                    "reference_id": "USN-5894-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5894-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583299?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584156?format=api",
                    "purl": "pkg:deb/debian/curl@7.86.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-43552"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69488?format=api",
            "vulnerability_id": "VCID-9mjz-apkm-g7h1",
            "summary": "libcurl: curl: QUIC certificate check skip with wolfSSL",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4947.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4947.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22624",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22731",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22775",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22565",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22641",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22692",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2271",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22671",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22613",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22628",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-4947"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-4947.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-4947.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3150884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3150884"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368887",
                    "reference_id": "2368887",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368887"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2887",
                    "reference_id": "AVG-2887",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2887"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-4947.json",
                    "reference_id": "CVE-2025-4947.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-4947.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585168?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-4947"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9mjz-apkm-g7h1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49278?format=api",
            "vulnerability_id": "VCID-9nak-pscy-e7gs",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82218",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82185",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82179",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8553",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02591",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85547",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85998",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85969",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32221"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32221.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32221.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1704017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1704017"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411",
                    "reference_id": "2135411",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135411"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/05/17/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/05/17/4"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5330",
                    "reference_id": "dsa-5330",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5330"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230110-0006/",
                    "reference_id": "ntap-20230110-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230110-0006/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230208-0002/",
                    "reference_id": "ntap-20230208-0002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230208-0002/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0333",
                    "reference_id": "RHSA-2023:0333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0333"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4139",
                    "reference_id": "RHSA-2023:4139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-2/",
                    "reference_id": "USN-5702-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5823-1/",
                    "reference_id": "USN-5823-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5823-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583299?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583300?format=api",
                    "purl": "pkg:deb/debian/curl@7.86.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-32221"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49918?format=api",
            "vulnerability_id": "VCID-9q2w-yxvk-pbhd",
            "summary": "cURL is vulnerable to local arbitrary code execution via buffer overflow\n    due to the insecure parsing of URLs.",
            "references": [
                {
                    "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt"
                },
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20051207.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20051207.html"
                },
                {
                    "reference_url": "http://docs.info.apple.com/article.html?artnum=307562",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://docs.info.apple.com/article.html?artnum=307562"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
                },
                {
                    "reference_url": "http://qa.openoffice.org/issues/show_bug.cgi?id=59032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://qa.openoffice.org/issues/show_bug.cgi?id=59032"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50143",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50051",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50101",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50098",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50085",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50113",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50063",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50117",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5011",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50128",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4077"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2005-4077.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2005-4077.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17907"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17960",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17960"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17961"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17965"
                },
                {
                    "reference_url": "http://secunia.com/advisories/17977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/17977"
                },
                {
                    "reference_url": "http://secunia.com/advisories/18105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/18105"
                },
                {
                    "reference_url": "http://secunia.com/advisories/18188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/18188"
                },
                {
                    "reference_url": "http://secunia.com/advisories/18336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/18336"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19261"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19433"
                },
                {
                    "reference_url": "http://secunia.com/advisories/19457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/19457"
                },
                {
                    "reference_url": "http://secunia.com/advisories/20077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/20077"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855"
                },
                {
                    "reference_url": "http://www.debian.org/security/2005/dsa-919",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2005/dsa-919"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml"
                },
                {
                    "reference_url": "http://www.hardened-php.net/advisory_242005.109.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.hardened-php.net/advisory_242005.109.html"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:224"
                },
                {
                    "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-875.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-875.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/418849/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/archive/1/418849/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/15756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/15756"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/17951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/17951"
                },
                {
                    "reference_url": "http://www.trustix.org/errata/2005/0072/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.trustix.org/errata/2005/0072/"
                },
                {
                    "reference_url": "http://www.us-cert.gov/cas/techalerts/TA06-132A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.us-cert.gov/cas/techalerts/TA06-132A.html"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2005/2791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2005/2791"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/0960",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/0960"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2006/1779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2006/1779"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/0924/references",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/0924/references"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617850",
                    "reference_id": "1617850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617850"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339",
                    "reference_id": "342339",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4077",
                    "reference_id": "CVE-2005-4077",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4077"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200512-09",
                    "reference_id": "GLSA-200512-09",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200512-09"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200603-25",
                    "reference_id": "GLSA-200603-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200603-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:875",
                    "reference_id": "RHSA-2005:875",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:875"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/228-1/",
                    "reference_id": "USN-228-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/228-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583930?format=api",
                    "purl": "pkg:deb/debian/curl@7.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-4077"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9q2w-yxvk-pbhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34694?format=api",
            "vulnerability_id": "VCID-a3v7-ptf1-6qgd",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66895",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66957",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66977",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66963",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66932",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66964",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66979",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7141"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-7141.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-7141.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229",
                    "reference_id": "1373229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918",
                    "reference_id": "836918",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2575",
                    "reference_id": "RHSA-2016:2575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2957",
                    "reference_id": "RHSA-2016:2957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-7141"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a3v7-ptf1-6qgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/164220?format=api",
            "vulnerability_id": "VCID-a9b6-m25r-kygw",
            "summary": "The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by \"*.com.\"",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9952",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7708",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77063",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77042",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77037",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77078",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76977",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76983",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77012",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76993",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77025",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77035",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9952"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-9952.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-9952.html"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161221B.html",
                    "reference_id": "adv_20161221B.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:19:07Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161221B.html"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-9952.patch",
                    "reference_id": "CVE-2016-9952.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:19:07Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-9952.patch"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9952"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9b6-m25r-kygw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47222?format=api",
            "vulnerability_id": "VCID-ac6r-spds-qbf5",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5435.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5435.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38429",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38449",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38464",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38427",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38402",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38503",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38528",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3839",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00172",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38441",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5435"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2019-5435.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2019-5435.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435"
                },
                {
                    "reference_url": "https://hackerone.com/reports/547630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/547630"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710609",
                    "reference_id": "1710609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710609"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929352",
                    "reference_id": "929352",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929352"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-13",
                    "reference_id": "ASA-201905-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-14",
                    "reference_id": "ASA-201905-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201905-15",
                    "reference_id": "ASA-201905-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201905-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-961",
                    "reference_id": "AVG-961",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-961"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-962",
                    "reference_id": "AVG-962",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-962"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-963",
                    "reference_id": "AVG-963",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-963"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-29",
                    "reference_id": "GLSA-202003-29",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202003-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4383",
                    "reference_id": "RHSA-2020:4383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4383"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4384",
                    "reference_id": "RHSA-2020:4384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4384"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3993-1/",
                    "reference_id": "USN-3993-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3993-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584375?format=api",
                    "purl": "pkg:deb/debian/curl@7.64.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-5435"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ac6r-spds-qbf5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59713?format=api",
            "vulnerability_id": "VCID-ae59-w7a1-7keg",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78736",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78727",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79892",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79891",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80043",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80036",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80109",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80089",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80053",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80064",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000254"
                },
                {
                    "reference_url": "https://curl.haxx.se/673d0cd8.patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/673d0cd8.patch"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20171004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_20171004.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-1000254.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-1000254.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://support.apple.com/HT208331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT208331"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2017/dsa-3992"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/101115"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1039509"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541",
                    "reference_id": "1495541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671",
                    "reference_id": "877671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-2",
                    "reference_id": "ASA-201710-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-2"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-3",
                    "reference_id": "ASA-201710-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-4",
                    "reference_id": "ASA-201710-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-5",
                    "reference_id": "ASA-201710-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-6",
                    "reference_id": "ASA-201710-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-7",
                    "reference_id": "ASA-201710-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-371",
                    "reference_id": "AVG-371",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-371"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-386",
                    "reference_id": "AVG-386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-387",
                    "reference_id": "AVG-387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-388",
                    "reference_id": "AVG-388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-389",
                    "reference_id": "AVG-389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-389"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-422",
                    "reference_id": "AVG-422",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-422"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254",
                    "reference_id": "CVE-2017-1000254",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201712-04",
                    "reference_id": "GLSA-201712-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201712-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-1/",
                    "reference_id": "USN-3441-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-2/",
                    "reference_id": "USN-3441-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582668?format=api",
                    "purl": "pkg:deb/debian/curl@7.56.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.56.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000254"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64298?format=api",
            "vulnerability_id": "VCID-amgy-dw6h-6ydf",
            "summary": "curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11817",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1188",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11805",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11667",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11837",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12823",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12966",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12921",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12821",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3805"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-3805.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-3805.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3591944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3591944"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446451",
                    "reference_id": "2446451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446451"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-3805.json",
                    "reference_id": "CVE-2026-3805.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-3805.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8084-1/",
                    "reference_id": "USN-8084-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8084-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-3805"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-amgy-dw6h-6ydf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57263?format=api",
            "vulnerability_id": "VCID-arjz-67yz-wkg9",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40463",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40415",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40434",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40472",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4044",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40465",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40389",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00216",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4427",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27533"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-27533.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-27533.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1891474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1891474"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179062",
                    "reference_id": "2179062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179062"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
                    "reference_id": "36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0011/",
                    "reference_id": "ntap-20230420-0011",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230420-0011/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354",
                    "reference_id": "RHSA-2023:3354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355",
                    "reference_id": "RHSA-2023:3355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3355"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6679",
                    "reference_id": "RHSA-2023:6679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6679"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-1/",
                    "reference_id": "USN-5964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-2/",
                    "reference_id": "USN-5964-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584288?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584289?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-27533"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68003?format=api",
            "vulnerability_id": "VCID-aua9-4frt-xugf",
            "summary": "curl: libcurl: Curl out of bounds read for cookie path",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9086.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9086.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10241",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10138",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10177",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13412",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14208",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14356",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14098",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14303",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14302",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9086"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-9086.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-9086.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3294999",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3294999"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750",
                    "reference_id": "2394750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394750"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-9086.json",
                    "reference_id": "CVE-2025-9086.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-9086.json"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23043",
                    "reference_id": "RHSA-2025:23043",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23043"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23125",
                    "reference_id": "RHSA-2025:23125",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23125"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23126",
                    "reference_id": "RHSA-2025:23126",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23126"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23127",
                    "reference_id": "RHSA-2025:23127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23127"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:23383",
                    "reference_id": "RHSA-2025:23383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:23383"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1350",
                    "reference_id": "RHSA-2026:1350",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1350"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1477",
                    "reference_id": "RHSA-2026:1477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736",
                    "reference_id": "RHSA-2026:1736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:1825",
                    "reference_id": "RHSA-2026:1825",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:1825"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485",
                    "reference_id": "RHSA-2026:2485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563",
                    "reference_id": "RHSA-2026:2563",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:2563"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943",
                    "reference_id": "RHSA-2026:4943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:4943"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586210?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586211?format=api",
                    "purl": "pkg:deb/debian/curl@8.16.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.16.0~rc2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-9086"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aua9-4frt-xugf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34689?format=api",
            "vulnerability_id": "VCID-b2ef-zj3u-rbhy",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20160127A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20160127A.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0755",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61496",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61452",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61492",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61402",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61431",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61401",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61463",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61484",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61471",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0755"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-0755.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-0755.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755"
                },
                {
                    "reference_url": "https://support.apple.com/HT207170",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT207170"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3455"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82307"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034882"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2882-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2882-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302263",
                    "reference_id": "1302263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302263"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0755",
                    "reference_id": "CVE-2016-0755",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0755"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2882-1/",
                    "reference_id": "USN-2882-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2882-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584745?format=api",
                    "purl": "pkg:deb/debian/curl@7.47.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.47.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-0755"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47210?format=api",
            "vulnerability_id": "VCID-b69q-9yrr-myf7",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0853.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0853.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0853",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36442",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36475",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3631",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36378",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36385",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3635",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00156",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3637",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0853"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262097",
                    "reference_id": "2262097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262097"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2298922",
                    "reference_id": "2298922",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2298922"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-0853.html",
                    "reference_id": "CVE-2024-0853.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-0853.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-0853.json",
                    "reference_id": "CVE-2024-0853.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-0853.json"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-20",
                    "reference_id": "GLSA-202409-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-20"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240307-0004/",
                    "reference_id": "ntap-20240307-0004",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240307-0004/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240426-0009/",
                    "reference_id": "ntap-20240426-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240426-0009/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240503-0012/",
                    "reference_id": "ntap-20240503-0012",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240503-0012/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585837?format=api",
                    "purl": "pkg:deb/debian/curl@8.6.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.6.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-0853"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b69q-9yrr-myf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49271?format=api",
            "vulnerability_id": "VCID-bb2f-7qrm-1kca",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22998",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23104",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23149",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2294",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23013",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23066",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23085",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23049",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22992",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23006",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27781"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27781.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27781.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1555441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1555441"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204",
                    "reference_id": "2082204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082204"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0009/",
                    "reference_id": "ntap-20220609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5412-1/",
                    "reference_id": "USN-5412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5412-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5499-1/",
                    "reference_id": "USN-5499-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5499-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582920?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27781"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bb2f-7qrm-1kca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41498?format=api",
            "vulnerability_id": "VCID-bdrx-sm6b-sken",
            "summary": "Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6422.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6422.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48715",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.486",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48641",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48663",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48669",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48666",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48684",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48658",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48719",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6422"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2013-6422.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2013-6422.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1037918",
                    "reference_id": "1037918",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1037918"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-14",
                    "reference_id": "GLSA-201401-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2058-1/",
                    "reference_id": "USN-2058-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2058-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584434?format=api",
                    "purl": "pkg:deb/debian/curl@7.34.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.34.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-6422"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdrx-sm6b-sken"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11278?format=api",
            "vulnerability_id": "VCID-bdy2-8gub-tfe6",
            "summary": "Double Free\nWhen sending data to an MQTT server, libcurl could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57605",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57686",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57741",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57748",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57719",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57738",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57759",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57743",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57712",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00353",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5769",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22945"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22945.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22945.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1269242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1269242"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001527",
                    "reference_id": "2001527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001527"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/29",
                    "reference_id": "29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/29"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/",
                    "reference_id": "APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2384",
                    "reference_id": "AVG-2384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2384"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2385",
                    "reference_id": "AVG-2385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2385"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2386",
                    "reference_id": "AVG-2386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2387",
                    "reference_id": "AVG-2387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2388",
                    "reference_id": "AVG-2388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2389",
                    "reference_id": "AVG-2389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2389"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945",
                    "reference_id": "CVE-2021-22945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22945"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213183",
                    "reference_id": "HT213183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213183"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211029-0003/",
                    "reference_id": "ntap-20211029-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/",
                    "reference_id": "RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-1/",
                    "reference_id": "USN-5079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584001?format=api",
                    "purl": "pkg:deb/debian/curl@7.79.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22945"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdy2-8gub-tfe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34693?format=api",
            "vulnerability_id": "VCID-bgtv-jrna-9yb3",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79647",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79724",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79695",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79653",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79675",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79661",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79697",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79718",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79702",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5421"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-5421.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-5421.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362199",
                    "reference_id": "1362199",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362199"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3048-1/",
                    "reference_id": "USN-3048-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3048-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584626?format=api",
                    "purl": "pkg:deb/debian/curl@7.50.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-5421"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgtv-jrna-9yb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59715?format=api",
            "vulnerability_id": "VCID-bhvd-ntxz-dkg4",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63857",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63733",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63821",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63778",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63829",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63846",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6386",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63812",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00454",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63848",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8816"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_2017-12e7.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_2017-12e7.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-8816.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-8816.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817"
                },
                {
                    "reference_url": "http://security.cucumberlinux.com/security/details.php?id=161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "http://security.cucumberlinux.com/security/details.php?id=161"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4051"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101998",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101998"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039896",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039896"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040608"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1515757",
                    "reference_id": "1515757",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1515757"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-36",
                    "reference_id": "ASA-201711-36",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-36"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-37",
                    "reference_id": "ASA-201711-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-38",
                    "reference_id": "ASA-201711-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-38"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-521",
                    "reference_id": "AVG-521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-521"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-522",
                    "reference_id": "AVG-522",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-522"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-523",
                    "reference_id": "AVG-523",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-523"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-527",
                    "reference_id": "AVG-527",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-527"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-528",
                    "reference_id": "AVG-528",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-528"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-529",
                    "reference_id": "AVG-529",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-529"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8816",
                    "reference_id": "CVE-2017-8816",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8816"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201712-04",
                    "reference_id": "GLSA-201712-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201712-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3498-1/",
                    "reference_id": "USN-3498-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3498-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585790?format=api",
                    "purl": "pkg:deb/debian/curl@7.57.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-8816"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bhvd-ntxz-dkg4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49701?format=api",
            "vulnerability_id": "VCID-bv57-gvfs-qfhj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86848",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86924",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86877",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86872",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.869",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86913",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86908",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86902",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86919",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86858",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000121"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-1000121.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-1000121.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552631",
                    "reference_id": "1552631",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552631"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546",
                    "reference_id": "893546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-15",
                    "reference_id": "ASA-201803-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-16",
                    "reference_id": "ASA-201803-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-17",
                    "reference_id": "ASA-201803-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-18",
                    "reference_id": "ASA-201803-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-19",
                    "reference_id": "ASA-201803-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-19"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-20",
                    "reference_id": "ASA-201803-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-653",
                    "reference_id": "AVG-653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-653"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-654",
                    "reference_id": "AVG-654",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-654"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-655",
                    "reference_id": "AVG-655",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-655"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-656",
                    "reference_id": "AVG-656",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-656"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-660",
                    "reference_id": "AVG-660",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-660"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-661",
                    "reference_id": "AVG-661",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-661"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-04",
                    "reference_id": "GLSA-201804-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582786?format=api",
                    "purl": "pkg:deb/debian/curl@7.60.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1000121"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bv57-gvfs-qfhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89213?format=api",
            "vulnerability_id": "VCID-bvgs-71kb-mbcx",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940"
                },
                {
                    "reference_url": "http://marc.info/?l=full-disclosure&m=110959085507755&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=full-disclosure&m=110959085507755&w=2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85582",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85557",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85553",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85577",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85483",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85495",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85512",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85516",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85536",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85545",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8556",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0490"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2005-0490.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2005-0490.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities"
                },
                {
                    "reference_url": "http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:048"
                },
                {
                    "reference_url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-340.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2005-340.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/12615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/12615"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/12616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/12616"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617532",
                    "reference_id": "1617532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617532"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0490",
                    "reference_id": "CVE-2005-0490",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2005:340",
                    "reference_id": "RHSA-2005:340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2005:340"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/86-1/",
                    "reference_id": "USN-86-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/86-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586281?format=api",
                    "purl": "pkg:deb/debian/curl@7.13.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.13.0-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2005-0490"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bvgs-71kb-mbcx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57270?format=api",
            "vulnerability_id": "VCID-bz4u-6rft-s3a8",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38039.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38039.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-38039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93847",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9386",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93856",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93845",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93835",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93893",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93887",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93865",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-38039"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-38039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-38039.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2072338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2072338"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Oct/17",
                    "reference_id": "17",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Oct/17"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239135",
                    "reference_id": "2239135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239135"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/34",
                    "reference_id": "34",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/34"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/37",
                    "reference_id": "37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/37"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/38",
                    "reference_id": "38",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/38"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/",
                    "reference_id": "5DCZMYODALBLVOXVJEN2LF2MLANEYL4F",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214036",
                    "reference_id": "HT214036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214036"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214057",
                    "reference_id": "HT214057",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214057"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214058",
                    "reference_id": "HT214058",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214058"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214063",
                    "reference_id": "HT214063",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214063"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/",
                    "reference_id": "M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231013-0005/",
                    "reference_id": "ntap-20231013-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20231013-0005/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625",
                    "reference_id": "RHSA-2023:7625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626",
                    "reference_id": "RHSA-2023:7626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7626"
                },
                {
                    "reference_url": "https://www.insyde.com/security-pledge/SA-2023064",
                    "reference_id": "SA-2023064",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://www.insyde.com/security-pledge/SA-2023064"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/",
                    "reference_id": "TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6363-1/",
                    "reference_id": "USN-6363-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6363-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586888?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586889?format=api",
                    "purl": "pkg:deb/debian/curl@8.3.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-38039"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz4u-6rft-s3a8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56000?format=api",
            "vulnerability_id": "VCID-c2na-7q9e-47am",
            "summary": "information disclosure",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80423",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80422",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80342",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80368",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80357",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80386",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80415",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80393",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0015"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-0015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-0015.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1053903",
                    "reference_id": "1053903",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1053903"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0561",
                    "reference_id": "RHSA-2014:0561",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0561"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2097-1/",
                    "reference_id": "USN-2097-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2097-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/587022?format=api",
                    "purl": "pkg:deb/debian/curl@7.35.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.35.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-0015"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c2na-7q9e-47am"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34704?format=api",
            "vulnerability_id": "VCID-c6dk-7gj6-7far",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74621",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74617",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74647",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7469",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7467",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74662",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74699",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74707",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8623"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8623.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8623.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388",
                    "reference_id": "1388388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94106",
                    "reference_id": "94106",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94106"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102I.html",
                    "reference_id": "adv_20161102I.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102I.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8623.patch",
                    "reference_id": "CVE-2016-8623.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8623.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8623",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8623"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16997?format=api",
            "vulnerability_id": "VCID-cbah-e86c-w3fj",
            "summary": "Improper Authentication\nAn authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20231",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20386",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20446",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2017",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20251",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20311",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20341",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20295",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20236",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20226",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27535"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-27535.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-27535.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1892780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1892780"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179073",
                    "reference_id": "2179073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179073"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
                    "reference_id": "36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27535",
                    "reference_id": "CVE-2023-27535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27535"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
                    "reference_id": "ntap-20230420-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230420-0010/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2650",
                    "reference_id": "RHSA-2023:2650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3106",
                    "reference_id": "RHSA-2023:3106",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3106"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0428",
                    "reference_id": "RHSA-2024:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0428"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-1/",
                    "reference_id": "USN-5964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-2/",
                    "reference_id": "USN-5964-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584288?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584289?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-27535"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbah-e86c-w3fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49702?format=api",
            "vulnerability_id": "VCID-cbph-fu9d-gbah",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83368",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83471",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83381",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83396",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8342",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8343",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83445",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83439",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83435",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01942",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8347",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000122"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-1000122.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-1000122.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553398",
                    "reference_id": "1553398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553398"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546",
                    "reference_id": "893546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-15",
                    "reference_id": "ASA-201803-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-16",
                    "reference_id": "ASA-201803-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-17",
                    "reference_id": "ASA-201803-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-18",
                    "reference_id": "ASA-201803-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-19",
                    "reference_id": "ASA-201803-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-19"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-20",
                    "reference_id": "ASA-201803-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-653",
                    "reference_id": "AVG-653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-653"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-654",
                    "reference_id": "AVG-654",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-654"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-655",
                    "reference_id": "AVG-655",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-655"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-656",
                    "reference_id": "AVG-656",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-656"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-660",
                    "reference_id": "AVG-660",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-660"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-661",
                    "reference_id": "AVG-661",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-661"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-04",
                    "reference_id": "GLSA-201804-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582786?format=api",
                    "purl": "pkg:deb/debian/curl@7.60.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1000122"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbph-fu9d-gbah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46198?format=api",
            "vulnerability_id": "VCID-cp4n-p2z3-43b4",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05444",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05486",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05479",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05514",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0557",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05545",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05476",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8177"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2020-8177.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:05:17Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2020-8177.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/887462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:05:17Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/887462"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847915",
                    "reference_id": "1847915",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847915"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281",
                    "reference_id": "965281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1194",
                    "reference_id": "AVG-1194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1194"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4881",
                    "reference_id": "dsa-4881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:05:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-16",
                    "reference_id": "GLSA-202007-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4599",
                    "reference_id": "RHSA-2020:4599",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4599"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5002",
                    "reference_id": "RHSA-2020:5002",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5002"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:5417",
                    "reference_id": "RHSA-2020:5417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:5417"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949",
                    "reference_id": "RHSA-2021:0949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0949"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4402-1/",
                    "reference_id": "USN-4402-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4402-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583866?format=api",
                    "purl": "pkg:deb/debian/curl@7.72.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-8177"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cp4n-p2z3-43b4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80257?format=api",
            "vulnerability_id": "VCID-d3s1-3qs7-2uhw",
            "summary": "curl: Cipher settings shared for all connections when using schannel TLS backed",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73845",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73945",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73894",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73936",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73855",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7388",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73851",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73886",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73899",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73921",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00791",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73903",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22897"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22897.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22897.html"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1172857",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1172857"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964904",
                    "reference_id": "1964904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964904"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2016",
                    "reference_id": "AVG-2016",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2016"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22897"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d3s1-3qs7-2uhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57267?format=api",
            "vulnerability_id": "VCID-ddgz-rczw-jqfw",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67593",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67526",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6757",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67592",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67546",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00538",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67581",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28320"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-28320.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-28320.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1929597",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1929597"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239",
                    "reference_id": "1036239",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196783",
                    "reference_id": "2196783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196783"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/47",
                    "reference_id": "47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/47"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/48",
                    "reference_id": "48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/48"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/52",
                    "reference_id": "52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/52"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213843",
                    "reference_id": "HT213843",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213843"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213844",
                    "reference_id": "HT213844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213844"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213845",
                    "reference_id": "HT213845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213845"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
                    "reference_id": "ntap-20230609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230609-0009/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583792?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-28320"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15716?format=api",
            "vulnerability_id": "VCID-dgtq-eaav-jyhf",
            "summary": "Out-of-bounds Write\nA buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHBA-2019:0327",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHBA-2019:0327"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1543"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0544",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81403",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81302",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81312",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81334",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81332",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81361",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81366",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81372",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81365",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81402",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000120"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_2018-9cd6.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_2018-9cd6.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/coapp-packages/curl",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/coapp-packages/curl"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3598-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3598-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3598-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3598-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3598-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3598-2"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3598-2/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3598-2/"
                },
                {
                    "reference_url": "https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531"
                },
                {
                    "reference_url": "https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4136"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552628",
                    "reference_id": "1552628",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552628"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546",
                    "reference_id": "893546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-15",
                    "reference_id": "ASA-201803-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-16",
                    "reference_id": "ASA-201803-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-17",
                    "reference_id": "ASA-201803-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-18",
                    "reference_id": "ASA-201803-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-19",
                    "reference_id": "ASA-201803-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-19"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201803-20",
                    "reference_id": "ASA-201803-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201803-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-653",
                    "reference_id": "AVG-653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-653"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-654",
                    "reference_id": "AVG-654",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-654"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-655",
                    "reference_id": "AVG-655",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-655"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-656",
                    "reference_id": "AVG-656",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-656"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-660",
                    "reference_id": "AVG-660",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-660"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-661",
                    "reference_id": "AVG-661",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-661"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120",
                    "reference_id": "CVE-2018-1000120",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000120"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-1000120.html",
                    "reference_id": "CVE-2018-1000120.HTML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-1000120.html"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-674j-7m97-j2p9",
                    "reference_id": "GHSA-674j-7m97-j2p9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-674j-7m97-j2p9"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-04",
                    "reference_id": "GLSA-201804-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582786?format=api",
                    "purl": "pkg:deb/debian/curl@7.60.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1000120",
                "GHSA-674j-7m97-j2p9"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtq-eaav-jyhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47224?format=api",
            "vulnerability_id": "VCID-dhrf-2sz5-3bhf",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86629",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86617",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8661",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86623",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8846",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88479",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88497",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88503",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88514",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88452",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88476",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5481"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2019-5481.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2019-5481.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/686823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/686823"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749402",
                    "reference_id": "1749402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749402"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009",
                    "reference_id": "940009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1982",
                    "reference_id": "AVG-1982",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1982"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2019-5481.html",
                    "reference_id": "CVE-2019-5481.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:07:56Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2019-5481.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-29",
                    "reference_id": "GLSA-202003-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:07:56Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202003-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0250",
                    "reference_id": "RHSA-2020:0250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1792",
                    "reference_id": "RHSA-2020:1792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1792"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4129-1/",
                    "reference_id": "USN-4129-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4129-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585101?format=api",
                    "purl": "pkg:deb/debian/curl@7.66.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-5481"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dhrf-2sz5-3bhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46646?format=api",
            "vulnerability_id": "VCID-dj5e-62rt-hkex",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89465",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8941",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89415",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89425",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89427",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89443",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89446",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89455",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89453",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04759",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89464",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0734"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2010-0734.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2010-0734.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=563220",
                    "reference_id": "563220",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=563220"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-02",
                    "reference_id": "GLSA-201203-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0273",
                    "reference_id": "RHSA-2010:0273",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0273"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0329",
                    "reference_id": "RHSA-2010:0329",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0329"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1158-1/",
                    "reference_id": "USN-1158-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1158-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584864?format=api",
                    "purl": "pkg:deb/debian/curl@7.20.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.20.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0734"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dj5e-62rt-hkex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59718?format=api",
            "vulnerability_id": "VCID-drkp-q9r5-ukcm",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8818.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8818.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8818",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68185",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68207",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00559",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68251",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72693",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72666",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72649",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72639",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72682",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8818"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_2017-af0a.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_2017-af0a.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-8818.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-8818.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818"
                },
                {
                    "reference_url": "http://security.cucumberlinux.com/security/details.php?id=163",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://security.cucumberlinux.com/security/details.php?id=163"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102014",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/102014"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1039898"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517691",
                    "reference_id": "1517691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517691"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-36",
                    "reference_id": "ASA-201711-36",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-36"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-37",
                    "reference_id": "ASA-201711-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-38",
                    "reference_id": "ASA-201711-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-38"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-521",
                    "reference_id": "AVG-521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-521"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-522",
                    "reference_id": "AVG-522",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-522"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-523",
                    "reference_id": "AVG-523",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-523"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-527",
                    "reference_id": "AVG-527",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-527"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-528",
                    "reference_id": "AVG-528",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-528"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-529",
                    "reference_id": "AVG-529",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-529"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8818",
                    "reference_id": "CVE-2017-8818",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8818"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201712-04",
                    "reference_id": "GLSA-201712-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201712-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585790?format=api",
                    "purl": "pkg:deb/debian/curl@7.57.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-8818"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drkp-q9r5-ukcm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34687?format=api",
            "vulnerability_id": "VCID-dzzd-afgu-3fcy",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79187",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79112",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79119",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79144",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79129",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79153",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79185",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7917",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8150"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-8150.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-8150.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178692",
                    "reference_id": "1178692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178692"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1254",
                    "reference_id": "RHSA-2015:1254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2159",
                    "reference_id": "RHSA-2015:2159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2159"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2474-1/",
                    "reference_id": "USN-2474-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2474-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583314?format=api",
                    "purl": "pkg:deb/debian/curl@7.38.0-4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-8150"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40939?format=api",
            "vulnerability_id": "VCID-e1yx-dxa6-1bba",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88172",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88174",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88099",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88108",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88124",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88131",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8815",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88156",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88159",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03832",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8816",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3389"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2011-3389.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2011-3389.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506",
                    "reference_id": "737506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201111-02",
                    "reference_id": "GLSA-201111-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201111-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-02",
                    "reference_id": "GLSA-201203-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1380",
                    "reference_id": "RHSA-2011:1380",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1380"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:1384",
                    "reference_id": "RHSA-2011:1384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:1384"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0006",
                    "reference_id": "RHSA-2012:0006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0034",
                    "reference_id": "RHSA-2012:0034",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0034"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0343",
                    "reference_id": "RHSA-2012:0343",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0343"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508",
                    "reference_id": "RHSA-2012:0508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1263-1/",
                    "reference_id": "USN-1263-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1263-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582527?format=api",
                    "purl": "pkg:deb/debian/curl@7.24.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.24.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-3389"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34705?format=api",
            "vulnerability_id": "VCID-e58m-g37d-9fd6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8003",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80052",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80042",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80069",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80078",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80023",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80102",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80073",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80082",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8624"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8624.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8624.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390",
                    "reference_id": "1388390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94103",
                    "reference_id": "94103",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94103"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102J.html",
                    "reference_id": "adv_20161102J.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102J.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E",
                    "reference_id": "rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8624",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8624"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34690?format=api",
            "vulnerability_id": "VCID-eap9-v2gp-fqgh",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77711",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77748",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77652",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77659",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77686",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77669",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77696",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77702",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77728",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77712",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3739"
                },
                {
                    "reference_url": "https://curl.haxx.se/changes.html#7_49_0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/changes.html#7_49_0"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-3739.patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/CVE-2016-3739.patch"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20160518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_20160518.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-3739.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-3739.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/4"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/90726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/90726"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035907"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335430",
                    "reference_id": "1335430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335430"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3739",
                    "reference_id": "CVE-2016-3739",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3739"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584626?format=api",
                    "purl": "pkg:deb/debian/curl@7.50.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-3739"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eap9-v2gp-fqgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57774?format=api",
            "vulnerability_id": "VCID-eer3-29q8-sbgq",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20141105.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20141105.html"
                },
                {
                    "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43386",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43397",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43274",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43359",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43296",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43348",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43363",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43384",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43352",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00209",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43337",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3707"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-3707.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-3707.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT205031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/kb/HT205031"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3069",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3069"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/70988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/70988"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2399-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2399-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154941",
                    "reference_id": "1154941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154941"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3707",
                    "reference_id": "CVE-2014-3707",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3707"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1254",
                    "reference_id": "RHSA-2015:1254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2159",
                    "reference_id": "RHSA-2015:2159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2159"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2399-1/",
                    "reference_id": "USN-2399-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2399-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586404?format=api",
                    "purl": "pkg:deb/debian/curl@7.38.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3707"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eer3-29q8-sbgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49281?format=api",
            "vulnerability_id": "VCID-ej47-4dcu-5fhy",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64454",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64407",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00467",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64442",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70143",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74203",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7425",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74235",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00812",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74272",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42915"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-42915.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-42915.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1722065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1722065"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413",
                    "reference_id": "2135413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135413"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/",
                    "reference_id": "37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/",
                    "reference_id": "HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0010/",
                    "reference_id": "ntap-20221209-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0010/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/",
                    "reference_id": "Q27V5YYMXUVI6PRZQVECON32XPVWTKDK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583300?format=api",
                    "purl": "pkg:deb/debian/curl@7.86.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-42915"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ej47-4dcu-5fhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86139?format=api",
            "vulnerability_id": "VCID-ekav-zg3k-v3ea",
            "summary": "curl: cookies accepted for TLDs",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20140910B.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20140910B.html"
                },
                {
                    "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79798",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79796",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7972",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79728",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79749",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79735",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79764",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7977",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79792",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79776",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79769",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3620"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-3620.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-3620.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT205031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/kb/HT205031"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3022"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/05/11/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2022/05/11/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/69742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/69742"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138846",
                    "reference_id": "1138846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138846"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3620",
                    "reference_id": "CVE-2014-3620",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3620"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2346-1/",
                    "reference_id": "USN-2346-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2346-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586725?format=api",
                    "purl": "pkg:deb/debian/curl@7.38.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3620"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ekav-zg3k-v3ea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64300?format=api",
            "vulnerability_id": "VCID-etzn-uhck-h7b2",
            "summary": "curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.035",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03509",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03521",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0352",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04152",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.042",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04175",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04144",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-3783"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-3783.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-3783.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3583983",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3583983"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446450",
                    "reference_id": "2446450",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2446450"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2026-3783.json",
                    "reference_id": "CVE-2026-3783.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2026-3783.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8084-1/",
                    "reference_id": "USN-8084-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8084-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8099-1/",
                    "reference_id": "USN-8099-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8099-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-3783"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-etzn-uhck-h7b2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46647?format=api",
            "vulnerability_id": "VCID-exhe-cmqf-duad",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83895",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83795",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83808",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83823",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83849",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83855",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83872",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83866",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83861",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83894",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2192"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2011-2192.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2011-2192.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615",
                    "reference_id": "631615",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454",
                    "reference_id": "711454",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711454"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-02",
                    "reference_id": "GLSA-201203-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2011:0918",
                    "reference_id": "RHSA-2011:0918",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2011:0918"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1158-1/",
                    "reference_id": "USN-1158-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1158-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583763?format=api",
                    "purl": "pkg:deb/debian/curl@7.21.6-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.21.6-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-2192"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-exhe-cmqf-duad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91161?format=api",
            "vulnerability_id": "VCID-f1aq-3cj8-gfbq",
            "summary": "curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-1605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59459",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59453",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59308",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59382",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59423",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59455",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59439",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00379",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59421",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-1605"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2003-1605.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2003-1605.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586347?format=api",
                    "purl": "pkg:deb/debian/curl@7.10.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.10.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2003-1605"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1aq-3cj8-gfbq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34707?format=api",
            "vulnerability_id": "VCID-fnj3-2du1-4bhx",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75525",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75596",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75557",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75548",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75506",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7559",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75578",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9586"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161221A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161221A.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-9586.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-9586.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95019"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037515"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406712",
                    "reference_id": "1406712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406712"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958",
                    "reference_id": "848958",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201612-22",
                    "reference_id": "ASA-201612-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201612-22"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-10",
                    "reference_id": "ASA-201701-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-11",
                    "reference_id": "ASA-201701-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-7",
                    "reference_id": "ASA-201701-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-8",
                    "reference_id": "ASA-201701-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-9",
                    "reference_id": "ASA-201701-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-112",
                    "reference_id": "AVG-112",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-112"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-113",
                    "reference_id": "AVG-113",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-113"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-114",
                    "reference_id": "AVG-114",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-114"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-115",
                    "reference_id": "AVG-115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-115"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-116",
                    "reference_id": "AVG-116",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-116"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-117",
                    "reference_id": "AVG-117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-117"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9586",
                    "reference_id": "CVE-2016-9586",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9586"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-1/",
                    "reference_id": "USN-3441-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-2/",
                    "reference_id": "USN-3441-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584923?format=api",
                    "purl": "pkg:deb/debian/curl@7.52.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9586"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94431?format=api",
            "vulnerability_id": "VCID-fnr7-xb26-dbez",
            "summary": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04288",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04279",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04269",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0429",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04302",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04334",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04349",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04343",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04329",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-19909"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19909"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/curl/curl/pull/4166",
                    "reference_id": "4166",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:11:17Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/pull/4166"
                },
                {
                    "reference_url": "https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/",
                    "reference_id": "cve-2020-19909-is-everything-that-is-wrong-with-cves",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:11:17Z/"
                        }
                    ],
                    "url": "https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585101?format=api",
                    "purl": "pkg:deb/debian/curl@7.66.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-19909"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fnr7-xb26-dbez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49713?format=api",
            "vulnerability_id": "VCID-fp65-97n1-xuaj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76442",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76447",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76475",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76489",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76501",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76527",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76506",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.765",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7654",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000100"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20170809B.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20170809B.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-1000100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-1000100.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://support.apple.com/HT208221",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/HT208221"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3992"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/100286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/100286"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039118"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478310",
                    "reference_id": "1478310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478310"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555",
                    "reference_id": "871555",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201708-16",
                    "reference_id": "ASA-201708-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201708-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-3",
                    "reference_id": "ASA-201710-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-4",
                    "reference_id": "ASA-201710-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-5",
                    "reference_id": "ASA-201710-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-6",
                    "reference_id": "ASA-201710-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201710-7",
                    "reference_id": "ASA-201710-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201710-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-370",
                    "reference_id": "AVG-370",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-370"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-371",
                    "reference_id": "AVG-371",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-371"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-386",
                    "reference_id": "AVG-386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-387",
                    "reference_id": "AVG-387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-388",
                    "reference_id": "AVG-388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-389",
                    "reference_id": "AVG-389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-389"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000100",
                    "reference_id": "CVE-2017-1000100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000100"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-14",
                    "reference_id": "GLSA-201709-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-1/",
                    "reference_id": "USN-3441-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-2/",
                    "reference_id": "USN-3441-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585811?format=api",
                    "purl": "pkg:deb/debian/curl@7.55.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.55.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000100"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fp65-97n1-xuaj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61668?format=api",
            "vulnerability_id": "VCID-frgg-29yv-dyf7",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22890.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22890.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25887",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25782",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25952",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25993",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25764",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25834",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25885",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25897",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25797",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.258",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22890"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22890.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22890.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1129529",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1129529"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941965",
                    "reference_id": "1941965",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941965"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/",
                    "reference_id": "2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986270",
                    "reference_id": "986270",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986270"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1753",
                    "reference_id": "AVG-1753",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1753"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1754",
                    "reference_id": "AVG-1754",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1754"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1755",
                    "reference_id": "AVG-1755",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1755"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1756",
                    "reference_id": "AVG-1756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1756"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22890",
                    "reference_id": "CVE-2021-22890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22890"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-36",
                    "reference_id": "GLSA-202105-36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-36"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/",
                    "reference_id": "ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/",
                    "reference_id": "KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210521-0007/",
                    "reference_id": "ntap-20210521-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210521-0007/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2471",
                    "reference_id": "RHSA-2021:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2472",
                    "reference_id": "RHSA-2021:2472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2472"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4898-1/",
                    "reference_id": "USN-4898-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4898-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583105?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22890"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frgg-29yv-dyf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61667?format=api",
            "vulnerability_id": "VCID-ggt7-eejg-xfb6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20928",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20925",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21003",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20987",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21131",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21078",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20845",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30149",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30169",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30153",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30201",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22876"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22876.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22876.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1101882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1101882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941964",
                    "reference_id": "1941964",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941964"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/",
                    "reference_id": "2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269",
                    "reference_id": "986269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1753",
                    "reference_id": "AVG-1753",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1753"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1754",
                    "reference_id": "AVG-1754",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1754"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1755",
                    "reference_id": "AVG-1755",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1755"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1756",
                    "reference_id": "AVG-1756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1756"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1757",
                    "reference_id": "AVG-1757",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1757"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1758",
                    "reference_id": "AVG-1758",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1758"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876",
                    "reference_id": "CVE-2021-22876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22876"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-36",
                    "reference_id": "GLSA-202105-36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202105-36"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/",
                    "reference_id": "ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/",
                    "reference_id": "KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html",
                    "reference_id": "msg00019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210521-0007/",
                    "reference_id": "ntap-20210521-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210521-0007/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2471",
                    "reference_id": "RHSA-2021:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2472",
                    "reference_id": "RHSA-2021:2472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2472"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4511",
                    "reference_id": "RHSA-2021:4511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4511"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1354",
                    "reference_id": "RHSA-2022:1354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1354"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4898-1/",
                    "reference_id": "USN-4898-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4898-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4903-1/",
                    "reference_id": "USN-4903-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4903-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583105?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22876"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19507?format=api",
            "vulnerability_id": "VCID-gnx2-djyk-uyaf",
            "summary": "Cookie injection with none file\nThis flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle does not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-38546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49032",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48964",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48991",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48944",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48998",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48985",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49036",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-38546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2148242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/2148242"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241938",
                    "reference_id": "2241938",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241938"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/34",
                    "reference_id": "34",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/34"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/37",
                    "reference_id": "37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/37"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/38",
                    "reference_id": "38",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/38"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2845",
                    "reference_id": "AVG-2845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2845"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2846",
                    "reference_id": "AVG-2846",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2846"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38546",
                    "reference_id": "CVE-2023-38546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38546"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-38546.html",
                    "reference_id": "CVE-2023-38546.HTML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-38546.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214036",
                    "reference_id": "HT214036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214036"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214057",
                    "reference_id": "HT214057",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214057"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214058",
                    "reference_id": "HT214058",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214058"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214063",
                    "reference_id": "HT214063",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214063"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/",
                    "reference_id": "OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5700",
                    "reference_id": "RHSA-2023:5700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5700"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5763",
                    "reference_id": "RHSA-2023:5763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5763"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6292",
                    "reference_id": "RHSA-2023:6292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6745",
                    "reference_id": "RHSA-2023:6745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7540",
                    "reference_id": "RHSA-2023:7540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7540"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625",
                    "reference_id": "RHSA-2023:7625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626",
                    "reference_id": "RHSA-2023:7626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7626"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1601",
                    "reference_id": "RHSA-2024:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1601"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2092",
                    "reference_id": "RHSA-2024:2092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2092"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093",
                    "reference_id": "RHSA-2024:2093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2093"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2101",
                    "reference_id": "RHSA-2024:2101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2101"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6429-1/",
                    "reference_id": "USN-6429-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6429-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6429-2/",
                    "reference_id": "USN-6429-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6429-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6429-3/",
                    "reference_id": "USN-6429-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6429-3/"
                },
                {
                    "reference_url": "https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868",
                    "reference_id": "viewtopic.php?f=8&t=8868",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"
                        }
                    ],
                    "url": "https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586457?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586458?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586459?format=api",
                    "purl": "pkg:deb/debian/curl@8.3.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-38546"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49276?format=api",
            "vulnerability_id": "VCID-gv7x-j8bz-wycc",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42639",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42604",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42572",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42624",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42635",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42658",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00204",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42654",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32207"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32207.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32207.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1573634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1573634"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305",
                    "reference_id": "2099305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099305"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2817",
                    "reference_id": "AVG-2817",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2817"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6157",
                    "reference_id": "RHSA-2022:6157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583413?format=api",
                    "purl": "pkg:deb/debian/curl@7.84.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-32207"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gv7x-j8bz-wycc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41493?format=api",
            "vulnerability_id": "VCID-gwb6-rf4r-d3b2",
            "summary": "Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://blog.volema.com/curl-rce.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://blog.volema.com/curl-rce.html"
                },
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20130206.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20130206.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html"
                },
                {
                    "reference_url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0249.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0249.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97559",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97557",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97526",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97534",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97536",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97541",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97543",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97546",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.44202",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97549",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0249"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2013-0249.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2013-0249.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249"
                },
                {
                    "reference_url": "http://www.exploit-db.com/exploits/24487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.exploit-db.com/exploits/24487"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
                },
                {
                    "reference_url": "http://www.osvdb.org/89988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/89988"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/57842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/57842"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1028093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1028093"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1721-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1721-1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700002",
                    "reference_id": "700002",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700002"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=906779",
                    "reference_id": "906779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906779"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0249",
                    "reference_id": "CVE-2013-0249",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0249"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24487.py",
                    "reference_id": "CVE-2013-0249;OSVDB-89988",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24487.py"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-14",
                    "reference_id": "GLSA-201401-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-14"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1721-1/",
                    "reference_id": "USN-1721-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1721-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586609?format=api",
                    "purl": "pkg:deb/debian/curl@7.29.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.29.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-0249"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwb6-rf4r-d3b2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/164221?format=api",
            "vulnerability_id": "VCID-hj8v-tgnn-mfdw",
            "summary": "The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9953",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83048",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82946",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82963",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82976",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82973",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82998",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83005",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83021",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83015",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8301",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01854",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83049",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9953"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-9953.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-9953.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9953"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hj8v-tgnn-mfdw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79435?format=api",
            "vulnerability_id": "VCID-hjkx-6yep-mkde",
            "summary": "curl: removes wrong file on error",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75859",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75825",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75818",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75856",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75764",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75796",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75776",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75808",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7582",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00911",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75844",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27778"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27778.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27778.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1553598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1553598"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082194",
                    "reference_id": "2082194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082194"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582920?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27778"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkx-6yep-mkde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73974?format=api",
            "vulnerability_id": "VCID-hrsy-694u-2fec",
            "summary": "curl: OCSP stapling bypass with GnuTLS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66644",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66587",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66559",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66606",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66638",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66626",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66629",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66562",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-8096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310519",
                    "reference_id": "2310519",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310519"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2669852",
                    "reference_id": "2669852",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2669852"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-8096.html",
                    "reference_id": "CVE-2024-8096.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-8096.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-8096.json",
                    "reference_id": "CVE-2024-8096.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-8096.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7012-1/",
                    "reference_id": "USN-7012-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7012-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585843?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u14?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585844?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585845?format=api",
                    "purl": "pkg:deb/debian/curl@8.10.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.10.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-8096"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hrsy-694u-2fec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49261?format=api",
            "vulnerability_id": "VCID-hudt-78dw-tkf2",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5489",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55017",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55005",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55006",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54986",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00319",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62224",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62217",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62194",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22925"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22925.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22925.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1223882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1223882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970902",
                    "reference_id": "1970902",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1970902"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/39",
                    "reference_id": "39",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Sep/39"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Sep/40",
                    "reference_id": "40",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Sep/40"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-59",
                    "reference_id": "ASA-202107-59",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-59"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-60",
                    "reference_id": "ASA-202107-60",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-61",
                    "reference_id": "ASA-202107-61",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-62",
                    "reference_id": "ASA-202107-62",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-63",
                    "reference_id": "ASA-202107-63",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-64",
                    "reference_id": "ASA-202107-64",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-64"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2194",
                    "reference_id": "AVG-2194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2194"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2195",
                    "reference_id": "AVG-2195",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2195"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2196",
                    "reference_id": "AVG-2196",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2196"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2197",
                    "reference_id": "AVG-2197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2197"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2198",
                    "reference_id": "AVG-2198",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2198"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2199",
                    "reference_id": "AVG-2199",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2199"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212804",
                    "reference_id": "HT212804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212804"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212805",
                    "reference_id": "HT212805",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212805"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210902-0003/",
                    "reference_id": "ntap-20210902-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4511",
                    "reference_id": "RHSA-2021:4511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4511"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf",
                    "reference_id": "ssa-484086.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5021-1/",
                    "reference_id": "USN-5021-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5021-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5021-2/",
                    "reference_id": "USN-5021-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5021-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5894-1/",
                    "reference_id": "USN-5894-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5894-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22925"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34708?format=api",
            "vulnerability_id": "VCID-hyqp-z8hb-fqbt",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77953",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77864",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77892",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77874",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77906",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77917",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77954",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9594"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161223.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161223.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-9594.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-9594.html"
                },
                {
                    "reference_url": "https://www.tenable.com/security/tns-2017-04",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://www.tenable.com/security/tns-2017-04"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95094"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037528"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408385",
                    "reference_id": "1408385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408385"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201612-22",
                    "reference_id": "ASA-201612-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201612-22"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-10",
                    "reference_id": "ASA-201701-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-11",
                    "reference_id": "ASA-201701-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-7",
                    "reference_id": "ASA-201701-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-8",
                    "reference_id": "ASA-201701-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-9",
                    "reference_id": "ASA-201701-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-112",
                    "reference_id": "AVG-112",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-112"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-113",
                    "reference_id": "AVG-113",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-113"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-114",
                    "reference_id": "AVG-114",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-114"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-115",
                    "reference_id": "AVG-115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-115"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-116",
                    "reference_id": "AVG-116",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-116"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-117",
                    "reference_id": "AVG-117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-117"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9594",
                    "reference_id": "CVE-2016-9594",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9594"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9594"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hyqp-z8hb-fqbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34701?format=api",
            "vulnerability_id": "VCID-j2cq-q3r9-jfcp",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74344",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74258",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74284",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7429",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74305",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74326",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74306",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74298",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74335",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74253",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8620"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8620.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8620.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388382",
                    "reference_id": "1388382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388382"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94102",
                    "reference_id": "94102",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94102"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102F.html",
                    "reference_id": "adv_20161102F.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102F.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8620",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8620"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59714?format=api",
            "vulnerability_id": "VCID-j2qx-np45-4qdu",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75334",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75327",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76991",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77017",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0109",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77876",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80531",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80553",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80545",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80584",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01419",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80574",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000257"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20171023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20171023.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-1000257.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-1000257.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:P"
                        },
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-4007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-4007"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101519",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/101519"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039644",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039644"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705",
                    "reference_id": "1503705",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-10",
                    "reference_id": "ASA-201711-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-11",
                    "reference_id": "ASA-201711-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-6",
                    "reference_id": "ASA-201711-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-7",
                    "reference_id": "ASA-201711-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-8",
                    "reference_id": "ASA-201711-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-9",
                    "reference_id": "ASA-201711-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-462",
                    "reference_id": "AVG-462",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-462"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-463",
                    "reference_id": "AVG-463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-463"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-464",
                    "reference_id": "AVG-464",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-464"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-465",
                    "reference_id": "AVG-465",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-465"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-466",
                    "reference_id": "AVG-466",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-466"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-467",
                    "reference_id": "AVG-467",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-467"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257",
                    "reference_id": "CVE-2017-1000257",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201712-04",
                    "reference_id": "GLSA-201712-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201712-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3263",
                    "reference_id": "RHSA-2017:3263",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3263"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-2/",
                    "reference_id": "USN-3441-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3457-1/",
                    "reference_id": "USN-3457-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3457-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582668?format=api",
                    "purl": "pkg:deb/debian/curl@7.56.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.56.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-1000257"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2qx-np45-4qdu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46197?format=api",
            "vulnerability_id": "VCID-j5s3-rr74-nqb8",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8169.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8169.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15732",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15586",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15708",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15643",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15576",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1576",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15827",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1563",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15715",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15774",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15743",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8169"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2020-8169.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2020-8169.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/874778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/874778"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847916",
                    "reference_id": "1847916",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1847916"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965280",
                    "reference_id": "965280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965280"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1194",
                    "reference_id": "AVG-1194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1194"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-16",
                    "reference_id": "GLSA-202007-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2471",
                    "reference_id": "RHSA-2021:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2472",
                    "reference_id": "RHSA-2021:2472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2472"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4402-1/",
                    "reference_id": "USN-4402-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4402-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583866?format=api",
                    "purl": "pkg:deb/debian/curl@7.72.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-8169"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j5s3-rr74-nqb8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34692?format=api",
            "vulnerability_id": "VCID-jeqg-g3en-5udw",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77847",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77943",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77906",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77944",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77854",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77882",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77864",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77896",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77923",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77907",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5420"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-5420.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-5420.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190",
                    "reference_id": "1362190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2575",
                    "reference_id": "RHSA-2016:2575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2957",
                    "reference_id": "RHSA-2016:2957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3048-1/",
                    "reference_id": "USN-3048-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3048-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584626?format=api",
                    "purl": "pkg:deb/debian/curl@7.50.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-5420"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49699?format=api",
            "vulnerability_id": "VCID-jnfc-8f5d-pyh4",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000005.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000005.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55445",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55623",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5558",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55558",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55609",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55611",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5562",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55599",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55582",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00326",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55555",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000005"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-1000005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-1000005.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536013",
                    "reference_id": "1536013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536013"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-20",
                    "reference_id": "ASA-201801-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-22",
                    "reference_id": "ASA-201801-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-22"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-23",
                    "reference_id": "ASA-201801-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-24",
                    "reference_id": "ASA-201801-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-24"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-25",
                    "reference_id": "ASA-201801-25",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-25"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-26",
                    "reference_id": "ASA-201801-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-26"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-593",
                    "reference_id": "AVG-593",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-593"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-594",
                    "reference_id": "AVG-594",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-594"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-595",
                    "reference_id": "AVG-595",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-595"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-596",
                    "reference_id": "AVG-596",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-596"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-597",
                    "reference_id": "AVG-597",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-597"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-598",
                    "reference_id": "AVG-598",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-598"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-04",
                    "reference_id": "GLSA-201804-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3554-1/",
                    "reference_id": "USN-3554-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3554-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585653?format=api",
                    "purl": "pkg:deb/debian/curl@7.58.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.58.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1000005"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnfc-8f5d-pyh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34702?format=api",
            "vulnerability_id": "VCID-jqqf-gmd3-ubcd",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84627",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84539",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84639",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84576",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8458",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84601",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84608",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8621"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8621.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8621.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385",
                    "reference_id": "1388385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94101",
                    "reference_id": "94101",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94101"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102G.html",
                    "reference_id": "adv_20161102G.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102G.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8621.patch",
                    "reference_id": "CVE-2016-8621.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8621.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8621"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34700?format=api",
            "vulnerability_id": "VCID-jtw4-af4y-nkbk",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86446",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86387",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86389",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86408",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86418",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8643",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86425",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86441",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8637",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8619"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8619.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8619.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379",
                    "reference_id": "1388379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8619"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50088?format=api",
            "vulnerability_id": "VCID-ju6h-a1sz-f7e5",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73018",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72955",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72994",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72942",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72917",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72968",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7291",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73008",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72967",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72922",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00742",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72973",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8285"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2020-8285.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2020-8285.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1045844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1045844"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902687",
                    "reference_id": "1902687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902687"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Apr/51",
                    "reference_id": "51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Apr/51"
                },
                {
                    "reference_url": "https://github.com/curl/curl/issues/6255",
                    "reference_id": "6255",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/issues/6255"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162",
                    "reference_id": "977162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1337",
                    "reference_id": "AVG-1337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1337"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8285",
                    "reference_id": "CVE-2020-8285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8285"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/",
                    "reference_id": "DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4881",
                    "reference_id": "dsa-4881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-14",
                    "reference_id": "GLSA-202012-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-14"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212325",
                    "reference_id": "HT212325",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212325"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212326",
                    "reference_id": "HT212326",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212326"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212327",
                    "reference_id": "HT212327",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212327"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210122-0007/",
                    "reference_id": "ntap-20210122-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/",
                    "reference_id": "NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1610",
                    "reference_id": "RHSA-2021:1610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2471",
                    "reference_id": "RHSA-2021:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2472",
                    "reference_id": "RHSA-2021:2472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2472"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4665-1/",
                    "reference_id": "USN-4665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4665-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4665-2/",
                    "reference_id": "USN-4665-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4665-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586313?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-8285"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ju6h-a1sz-f7e5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34695?format=api",
            "vulnerability_id": "VCID-k8kj-q1je-f7bt",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84631",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84727",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84715",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8471",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84704",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84726",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84646",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84666",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84667",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84689",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84696",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7167"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-7167.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-7167.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906",
                    "reference_id": "1375906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945",
                    "reference_id": "837945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-18",
                    "reference_id": "ASA-201609-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-19",
                    "reference_id": "ASA-201609-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-19"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-20",
                    "reference_id": "AVG-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-21",
                    "reference_id": "AVG-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-21"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2016",
                    "reference_id": "RHSA-2017:2016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2016"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-7167"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16991?format=api",
            "vulnerability_id": "VCID-ke81-x2ze-rbc5",
            "summary": "Double Free\nA double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14504",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14539",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14609",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14418",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14558",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14506",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1908",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21741",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24345",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24288",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27537"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-27537.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-27537.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1897203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1897203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179097",
                    "reference_id": "2179097",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179097"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27537",
                    "reference_id": "CVE-2023-27537",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27537"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584289?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-27537"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ke81-x2ze-rbc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49307?format=api",
            "vulnerability_id": "VCID-krgt-drpz-y7cy",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000300.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000300.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75468",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75571",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7547",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75501",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75533",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75553",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75531",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75522",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75565",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-1000300"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_2018-82c2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_2018-82c2.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-1000300.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-1000300.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104207"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040933",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1040933"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575533",
                    "reference_id": "1575533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575533"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-13",
                    "reference_id": "ASA-201805-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-14",
                    "reference_id": "ASA-201805-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-14"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-15",
                    "reference_id": "ASA-201805-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-16",
                    "reference_id": "ASA-201805-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-16"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-17",
                    "reference_id": "ASA-201805-17",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-17"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-18",
                    "reference_id": "ASA-201805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-694",
                    "reference_id": "AVG-694",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-694"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-695",
                    "reference_id": "AVG-695",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-695"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-696",
                    "reference_id": "AVG-696",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-696"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-697",
                    "reference_id": "AVG-697",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-697"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-698",
                    "reference_id": "AVG-698",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-698"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-699",
                    "reference_id": "AVG-699",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-699"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000300",
                    "reference_id": "CVE-2018-1000300",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000300"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201806-05",
                    "reference_id": "GLSA-201806-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201806-05"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3648-1/",
                    "reference_id": "USN-3648-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3648-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582786?format=api",
                    "purl": "pkg:deb/debian/curl@7.60.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-1000300"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krgt-drpz-y7cy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68002?format=api",
            "vulnerability_id": "VCID-ksap-zrmb-ebcu",
            "summary": "curl: predictable WebSocket mask",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10148.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10148.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-10148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28161",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28205",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29742",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30704",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30714",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30746",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30749",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30659",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-10148"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-10148.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-10148.html"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3330839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3330839"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394749",
                    "reference_id": "2394749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394749"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-10148.json",
                    "reference_id": "CVE-2025-10148.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-10148.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586210?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921941?format=api",
                    "purl": "pkg:deb/debian/curl@8.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-10148"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksap-zrmb-ebcu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97811?format=api",
            "vulnerability_id": "VCID-kt4b-7ffh-4bch",
            "summary": "When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`\nwith the curl tool,curl should check the public key of the server certificate\nto verify the peer.\n\nThis check was skipped in a certain condition that would then make curl allow\nthe connection without performing the proper check, thus not noticing a\npossible impostor. To skip this check, the connection had to be done with QUIC\nwith ngtcp2 built to use GnuTLS and the user had to explicitly disable the\nstandard certificate verification.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13034.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13034.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01204",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01212",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01226",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0123",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01213",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01207",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01209",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.012",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01211",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0122",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13034"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-13034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:56:11Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-13034.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426406",
                    "reference_id": "2426406",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426406"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-13034.json",
                    "reference_id": "CVE-2025-13034.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:56:11Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-13034.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921943?format=api",
                    "purl": "pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-13034"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kt4b-7ffh-4bch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57266?format=api",
            "vulnerability_id": "VCID-m15r-v9sr-2bbn",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28319.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28319.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28319",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55138",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55072",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55097",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55122",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55134",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0032",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55114",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28319"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-28319.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-28319.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1913733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1913733"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239",
                    "reference_id": "1036239",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196778",
                    "reference_id": "2196778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196778"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/47",
                    "reference_id": "47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/47"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/48",
                    "reference_id": "48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/48"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/52",
                    "reference_id": "52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/52"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213843",
                    "reference_id": "HT213843",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213843"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213844",
                    "reference_id": "HT213844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213844"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213845",
                    "reference_id": "HT213845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213845"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
                    "reference_id": "ntap-20230609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230609-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4628",
                    "reference_id": "RHSA-2023:4628",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4628"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4629",
                    "reference_id": "RHSA-2023:4629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4629"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583792?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-28319"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m15r-v9sr-2bbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/134641?format=api",
            "vulnerability_id": "VCID-m3nh-aha9-dfbc",
            "summary": "Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \\ (backslash) as a separator of path components within the Content-disposition HTTP header.",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20101013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20101013.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7569",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75686",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7559",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75592",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75623",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75638",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75649",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75673",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00898",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75655",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-3842"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=642642",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642642"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2010-3842.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2010-3842.html"
                },
                {
                    "reference_url": "http://secunia.com/advisories/39532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/39532"
                },
                {
                    "reference_url": "http://securitytracker.com/id?1024583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://securitytracker.com/id?1024583"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/13/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2010/10/13/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/13/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2010/10/13/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2010/10/13/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2010/10/13/5"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3842",
                    "reference_id": "CVE-2010-3842",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3842"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-3842"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3nh-aha9-dfbc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/161670?format=api",
            "vulnerability_id": "VCID-m3r3-25yq-hqdc",
            "summary": "Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44368",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4446",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44395",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44446",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44453",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4447",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44438",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44437",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44494",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44484",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4606"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-4606"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m3r3-25yq-hqdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69458?format=api",
            "vulnerability_id": "VCID-m5fs-um7r-9qh2",
            "summary": "curl: libcurl: WebSocket endless loop",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5399.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5399.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5399",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43448",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65415",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65362",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65326",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65378",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65389",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65409",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65396",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65368",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00486",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65404",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-5399"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-5399.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-5399.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3168039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3168039"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370920",
                    "reference_id": "2370920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370920"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202506-2",
                    "reference_id": "ASA-202506-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202506-2"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2895",
                    "reference_id": "AVG-2895",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2895"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-5399.json",
                    "reference_id": "CVE-2025-5399.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-5399.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583707?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-5399"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m5fs-um7r-9qh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/147967?format=api",
            "vulnerability_id": "VCID-ma8s-he6x-z7a8",
            "summary": "curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52605",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52452",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52498",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52525",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52491",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52544",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52539",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5259",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52574",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52559",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00292",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52599",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2522"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-2522.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-2522.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-2522"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ma8s-he6x-z7a8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65185?format=api",
            "vulnerability_id": "VCID-mkyr-w79c-qqfz",
            "summary": "curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00595",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00587",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00586",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00582",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00583",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00579",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.006",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "7e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.00593",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14017"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-14017.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-14017.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427870",
                    "reference_id": "2427870",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427870"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-14017.json",
                    "reference_id": "CVE-2025-14017.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-14017.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-2/",
                    "reference_id": "USN-8062-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921943?format=api",
                    "purl": "pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-14017"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16992?format=api",
            "vulnerability_id": "VCID-ms2r-94ph-yyh3",
            "summary": "Improper Authentication\nAn authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01295",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01285",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0129",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01301",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01306",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0131",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01294",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01288",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01291",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01282",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27536"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-27536.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-27536.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1895135",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1895135"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179092",
                    "reference_id": "2179092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179092"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/",
                    "reference_id": "36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27536",
                    "reference_id": "CVE-2023-27536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27536"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0010/",
                    "reference_id": "ntap-20230420-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230420-0010/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4523",
                    "reference_id": "RHSA-2023:4523",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4523"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6679",
                    "reference_id": "RHSA-2023:6679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0428",
                    "reference_id": "RHSA-2024:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0428"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-1/",
                    "reference_id": "USN-5964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-2/",
                    "reference_id": "USN-5964-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584288?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584289?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-27536"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ms2r-94ph-yyh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74682?format=api",
            "vulnerability_id": "VCID-my7a-jeng-5bhw",
            "summary": "curl: macidn punycode buffer overread",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6874.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6874.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6874",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76925",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76855",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76835",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76866",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76877",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76905",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76879",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7692",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6874"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996",
                    "reference_id": "1076996",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/07/24/2",
                    "reference_id": "2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/07/24/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299654",
                    "reference_id": "2299654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2299654"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2604391",
                    "reference_id": "2604391",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2604391"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-6874.html",
                    "reference_id": "CVE-2024-6874.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-6874.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-6874.json",
                    "reference_id": "CVE-2024-6874.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-6874.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583078?format=api",
                    "purl": "pkg:deb/debian/curl@8.9.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-6874"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-my7a-jeng-5bhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50089?format=api",
            "vulnerability_id": "VCID-n51k-39uk-auca",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52157",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52113",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52154",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00384",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59683",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00384",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59638",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00384",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59662",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00384",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59632",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00384",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59564",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00384",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59717",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00384",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59697",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8286"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2020-8286.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2020-8286.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1048457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1048457"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906096",
                    "reference_id": "1906096",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906096"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Apr/50",
                    "reference_id": "50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Apr/50"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Apr/51",
                    "reference_id": "51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Apr/51"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Apr/54",
                    "reference_id": "54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Apr/54"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161",
                    "reference_id": "977161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1337",
                    "reference_id": "AVG-1337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1337"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8286",
                    "reference_id": "CVE-2020-8286",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8286"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/",
                    "reference_id": "DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4881",
                    "reference_id": "dsa-4881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-14",
                    "reference_id": "GLSA-202012-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-14"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212325",
                    "reference_id": "HT212325",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212325"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212326",
                    "reference_id": "HT212326",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212326"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212327",
                    "reference_id": "HT212327",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212327"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210122-0007/",
                    "reference_id": "ntap-20210122-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/",
                    "reference_id": "NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1610",
                    "reference_id": "RHSA-2021:1610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2471",
                    "reference_id": "RHSA-2021:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2472",
                    "reference_id": "RHSA-2021:2472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2472"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf",
                    "reference_id": "ssa-200951.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4665-1/",
                    "reference_id": "USN-4665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4665-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586313?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-8286"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n51k-39uk-auca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57262?format=api",
            "vulnerability_id": "VCID-n57n-cymy-z7dr",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2589",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2611",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25878",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25948",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25999",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26009",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25964",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25909",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-23916"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-23916.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-23916.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1826048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1826048"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371",
                    "reference_id": "1031371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167815",
                    "reference_id": "2167815",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167815"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/",
                    "reference_id": "BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5365",
                    "reference_id": "dsa-5365",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5365"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html",
                    "reference_id": "msg00035.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230309-0006/",
                    "reference_id": "ntap-20230309-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230309-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1140",
                    "reference_id": "RHSA-2023:1140",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1140"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1701",
                    "reference_id": "RHSA-2023:1701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1701"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1842",
                    "reference_id": "RHSA-2023:1842",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1842"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354",
                    "reference_id": "RHSA-2023:3354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355",
                    "reference_id": "RHSA-2023:3355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3355"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3460",
                    "reference_id": "RHSA-2023:3460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4139",
                    "reference_id": "RHSA-2023:4139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5891-1/",
                    "reference_id": "USN-5891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586100?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586101?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-23916"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n57n-cymy-z7dr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96494?format=api",
            "vulnerability_id": "VCID-nvzd-v3bs-6qek",
            "summary": "When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-15079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10292",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10208",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10359",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1026",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10333",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10428",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10388",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00035",
                            "scoring_system": "epss",
                            "scoring_elements": "0.10237",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-15079"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-15079.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-15079.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3477116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3477116"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426409",
                    "reference_id": "2426409",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426409"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-15079.json",
                    "reference_id": "CVE-2025-15079.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-15079.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-2/",
                    "reference_id": "USN-8062-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921944?format=api",
                    "purl": "pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-15079"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61669?format=api",
            "vulnerability_id": "VCID-ph5u-5j8n-4qah",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31806",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3182",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3184",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31808",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31843",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31882",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31879",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31849",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31935",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31797",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31977",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22898"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22898.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22898.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1176461",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1176461"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964887",
                    "reference_id": "1964887",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964887"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde",
                    "reference_id": "39ce47f219b09c380b81f89fe54ac586c8db6bde",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2021/07/21/4",
                    "reference_id": "4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2021/07/21/4"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228",
                    "reference_id": "989228",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-4",
                    "reference_id": "ASA-202106-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-5",
                    "reference_id": "ASA-202106-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-6",
                    "reference_id": "ASA-202106-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-7",
                    "reference_id": "ASA-202106-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-8",
                    "reference_id": "ASA-202106-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-9",
                    "reference_id": "ASA-202106-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1995",
                    "reference_id": "AVG-1995",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1995"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1996",
                    "reference_id": "AVG-1996",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1996"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1997",
                    "reference_id": "AVG-1997",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1997"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1998",
                    "reference_id": "AVG-1998",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1998"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1999",
                    "reference_id": "AVG-1999",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1999"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2000",
                    "reference_id": "AVG-2000",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2000"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-36",
                    "reference_id": "GLSA-202105-36",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-36"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/",
                    "reference_id": "POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4511",
                    "reference_id": "RHSA-2021:4511",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4511"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5021-1/",
                    "reference_id": "USN-5021-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5021-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5021-2/",
                    "reference_id": "USN-5021-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5021-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5894-1/",
                    "reference_id": "USN-5894-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5894-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584001?format=api",
                    "purl": "pkg:deb/debian/curl@7.79.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22898"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41495?format=api",
            "vulnerability_id": "VCID-prff-34kh-kbat",
            "summary": "Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20130412.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20130412.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85316",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85315",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85223",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85234",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85253",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85255",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85277",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85285",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.853",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85298",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02482",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85295",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1944"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2013-1944.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2013-1944.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944"
                },
                {
                    "reference_url": "http://secunia.com/advisories/53044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/53044"
                },
                {
                    "reference_url": "http://secunia.com/advisories/53051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/53051"
                },
                {
                    "reference_url": "http://secunia.com/advisories/53097",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/53097"
                },
                {
                    "reference_url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66"
                },
                {
                    "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121"
                },
                {
                    "reference_url": "http://www.debian.org/security/2012/dsa-2660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2012/dsa-2660"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"
                },
                {
                    "reference_url": "http://www.osvdb.org/92316",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.osvdb.org/92316"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/59058",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/59058"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-1801-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-1801-1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274",
                    "reference_id": "705274",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577",
                    "reference_id": "950577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1944",
                    "reference_id": "CVE-2013-1944",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1944"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-14",
                    "reference_id": "GLSA-201401-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0771",
                    "reference_id": "RHSA-2013:0771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0771"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1801-1/",
                    "reference_id": "USN-1801-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1801-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584357?format=api",
                    "purl": "pkg:deb/debian/curl@7.29.0-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.29.0-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-1944"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-prff-34kh-kbat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72951?format=api",
            "vulnerability_id": "VCID-pwn6-j8vf-rufk",
            "summary": "curl: HSTS subdomain overwrites parent cache entry",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9681.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9681.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72615",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72539",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72515",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7259",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72572",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72562",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72605",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00725",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72522",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9681"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086804",
                    "reference_id": "1086804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322969",
                    "reference_id": "2322969",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322969"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2764830",
                    "reference_id": "2764830",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2764830"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-9681.html",
                    "reference_id": "CVE-2024-9681.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-9681.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-9681.json",
                    "reference_id": "CVE-2024-9681.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-9681.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7104-1/",
                    "reference_id": "USN-7104-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7104-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921939?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921940?format=api",
                    "purl": "pkg:deb/debian/curl@8.11.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.11.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-9681"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwn6-j8vf-rufk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49265?format=api",
            "vulnerability_id": "VCID-q229-ag6u-u3hv",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50585",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00272",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50613",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56697",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5669",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00339",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56699",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5801",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58012",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58028",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00357",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57955",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22576"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-22576.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-22576.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1526328",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1526328"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295",
                    "reference_id": "1010295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077541",
                    "reference_id": "2077541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077541"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0008/",
                    "reference_id": "ntap-20220609-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582659?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-22576"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q229-ag6u-u3hv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49766?format=api",
            "vulnerability_id": "VCID-q3hu-8uy5-e3a4",
            "summary": "A coding error has been found in cURL, causing the TLS Certificate\n    Status Request extension check to always return true.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2629.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2629.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58261",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58413",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58366",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5834",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58393",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58399",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58416",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58395",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58376",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58408",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00363",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58346",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2629"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-2629.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-2629.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425746",
                    "reference_id": "1425746",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425746"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201703-1",
                    "reference_id": "ASA-201703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201703-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-179",
                    "reference_id": "AVG-179",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-179"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-180",
                    "reference_id": "AVG-180",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-180"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-181",
                    "reference_id": "AVG-181",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-181"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-182",
                    "reference_id": "AVG-182",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-182"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-183",
                    "reference_id": "AVG-183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-183"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-184",
                    "reference_id": "AVG-184",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-184"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201703-04",
                    "reference_id": "GLSA-201703-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201703-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585398?format=api",
                    "purl": "pkg:deb/debian/curl@7.52.1-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-2629"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3hu-8uy5-e3a4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49260?format=api",
            "vulnerability_id": "VCID-qbpd-star-6fgn",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25873",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25766",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25937",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25978",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25745",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25816",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25868",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25879",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25838",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25782",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25784",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22923"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22923.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22923.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1213181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1213181"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981438",
                    "reference_id": "1981438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981438"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-59",
                    "reference_id": "ASA-202107-59",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-59"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2194",
                    "reference_id": "AVG-2194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2194"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210902-0003/",
                    "reference_id": "ntap-20210902-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3582",
                    "reference_id": "RHSA-2021:3582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3903",
                    "reference_id": "RHSA-2021:3903",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3903"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584001?format=api",
                    "purl": "pkg:deb/debian/curl@7.79.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22923"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47208?format=api",
            "vulnerability_id": "VCID-qdcn-2u3v-b3cv",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60637",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60627",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60612",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60591",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60632",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62672",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62608",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00432",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62641",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46218"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-46218.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-46218.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2212193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/2212193"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646",
                    "reference_id": "1057646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252030",
                    "reference_id": "2252030",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252030"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-20",
                    "reference_id": "GLSA-202409-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0428",
                    "reference_id": "RHSA-2024:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0428"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0434",
                    "reference_id": "RHSA-2024:0434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0434"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0452",
                    "reference_id": "RHSA-2024:0452",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0452"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0585",
                    "reference_id": "RHSA-2024:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0585"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1129",
                    "reference_id": "RHSA-2024:1129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1316",
                    "reference_id": "RHSA-2024:1316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1317",
                    "reference_id": "RHSA-2024:1317",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1317"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1383",
                    "reference_id": "RHSA-2024:1383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1383"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1601",
                    "reference_id": "RHSA-2024:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1601"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2092",
                    "reference_id": "RHSA-2024:2092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2092"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093",
                    "reference_id": "RHSA-2024:2093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2093"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2094",
                    "reference_id": "RHSA-2024:2094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2094"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6535-1/",
                    "reference_id": "USN-6535-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6535-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6641-1/",
                    "reference_id": "USN-6641-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6641-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/587036?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u11%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/587037?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/587038?format=api",
                    "purl": "pkg:deb/debian/curl@8.5.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.5.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-46218"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdcn-2u3v-b3cv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39485?format=api",
            "vulnerability_id": "VCID-qka4-jfdb-w3d5",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3144.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3144.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77112",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77008",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77013",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77023",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77055",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77066",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77094",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77074",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7711",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3144"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2015-3144.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2015-3144.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213335",
                    "reference_id": "1213335",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213335"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201509-02",
                    "reference_id": "GLSA-201509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201509-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2591-1/",
                    "reference_id": "USN-2591-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2591-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586640?format=api",
                    "purl": "pkg:deb/debian/curl@7.42.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3144"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qka4-jfdb-w3d5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82462?format=api",
            "vulnerability_id": "VCID-qpfa-s6sd-8yct",
            "summary": "curl: Windows OpenSSL engine code injection",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76205",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76346",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7635",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76379",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76359",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76405",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76431",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76409",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76404",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00953",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76444",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5443"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2019-5443.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2019-5443.html"
                },
                {
                    "reference_url": "https://hackerone.com/reports/608577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/608577"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772100",
                    "reference_id": "1772100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1772100"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-5443"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfa-s6sd-8yct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66608?format=api",
            "vulnerability_id": "VCID-qpux-jh6k-8qhx",
            "summary": "curl: Curl missing SFTP host verification with wolfSSH backend",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10966.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10966.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-10966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04624",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05246",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0526",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05274",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05309",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05288",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05467",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05252",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05191",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07019",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-10966"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-10966.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-10966.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10966",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10966"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3355218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3355218"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413308",
                    "reference_id": "2413308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2413308"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-10966.json",
                    "reference_id": "CVE-2025-10966.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-10966.json"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921942?format=api",
                    "purl": "pkg:deb/debian/curl@8.17.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.17.0~rc2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-10966"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qpux-jh6k-8qhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36349?format=api",
            "vulnerability_id": "VCID-r3ny-7kn7-ukaa",
            "summary": "An error in the X.509 certificate handling of cURL might enable remote\n    attackers to conduct man-in-the-middle attacks.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9171",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91653",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91661",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91666",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91675",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91688",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91694",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91697",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.917",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91696",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0733",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91717",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2417"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2009-2417.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2009-2417.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=516181",
                    "reference_id": "516181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516181"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991",
                    "reference_id": "541991",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200909-20",
                    "reference_id": "GLSA-200909-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200909-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1209",
                    "reference_id": "RHSA-2009:1209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1158-1/",
                    "reference_id": "USN-1158-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1158-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/818-1/",
                    "reference_id": "USN-818-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/818-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586169?format=api",
                    "purl": "pkg:deb/debian/curl@7.19.5-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.19.5-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-2417"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3ny-7kn7-ukaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39489?format=api",
            "vulnerability_id": "VCID-r447-deb8-2ydj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3237.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3237.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89874",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89818",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89821",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89839",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89857",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89863",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89867",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8986",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89873",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3237"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2015-3237.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2015-3237.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233814",
                    "reference_id": "1233814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233814"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201509-02",
                    "reference_id": "GLSA-201509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201509-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583844?format=api",
                    "purl": "pkg:deb/debian/curl@7.43.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.43.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3237"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r447-deb8-2ydj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49268?format=api",
            "vulnerability_id": "VCID-r7bh-7wur-xffs",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71654",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71574",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71592",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71565",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71605",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71616",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71639",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71623",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71604",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00682",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71649",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27776"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27776.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27776.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1547048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1547048"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252",
                    "reference_id": "1010252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078408",
                    "reference_id": "2078408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078408"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/",
                    "reference_id": "7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/",
                    "reference_id": "DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0008/",
                    "reference_id": "ntap-20220609-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5245",
                    "reference_id": "RHSA-2022:5245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5313",
                    "reference_id": "RHSA-2022:5313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5313"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582659?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27776"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49280?format=api",
            "vulnerability_id": "VCID-rg54-svzj-x7f9",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3993",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39957",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41282",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41333",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41362",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4869",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48632",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48694",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-35260"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-35260.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-35260.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1721098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1721098"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135412",
                    "reference_id": "2135412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135412"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230110-0006/",
                    "reference_id": "ntap-20230110-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230110-0006/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583300?format=api",
                    "purl": "pkg:deb/debian/curl@7.86.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-35260"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rg54-svzj-x7f9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49270?format=api",
            "vulnerability_id": "VCID-rhxh-77pj-1bfy",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36659",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36748",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36779",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36667",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36692",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36658",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36632",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36677",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27780"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27780.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27780.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1553841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1553841"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082203",
                    "reference_id": "2082203",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082203"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220609-0009/",
                    "reference_id": "ntap-20220609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220609-0009/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5412-1/",
                    "reference_id": "USN-5412-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5412-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582920?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27780"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rhxh-77pj-1bfy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50087?format=api",
            "vulnerability_id": "VCID-rmez-cwu2-2ya7",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.283",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28391",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28321",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28408",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28364",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28411",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2831",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28466",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28368",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28508",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28299",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8284"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2020-8284.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2020-8284.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1040166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1040166"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902667",
                    "reference_id": "1902667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902667"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163",
                    "reference_id": "977163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1337",
                    "reference_id": "AVG-1337",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1337"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/",
                    "reference_id": "DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-4881",
                    "reference_id": "dsa-4881",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-4881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-14",
                    "reference_id": "GLSA-202012-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202012-14"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212325",
                    "reference_id": "HT212325",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212325"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212326",
                    "reference_id": "HT212326",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212326"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212327",
                    "reference_id": "HT212327",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212327"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html",
                    "reference_id": "msg00029.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210122-0007/",
                    "reference_id": "ntap-20210122-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210122-0007/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/",
                    "reference_id": "NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1610",
                    "reference_id": "RHSA-2021:1610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2471",
                    "reference_id": "RHSA-2021:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2472",
                    "reference_id": "RHSA-2021:2472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2472"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4665-1/",
                    "reference_id": "USN-4665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4665-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4665-2/",
                    "reference_id": "USN-4665-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4665-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586313?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-8284"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57269?format=api",
            "vulnerability_id": "VCID-s73y-y7v7-43cm",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70341",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70238",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70255",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70278",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70294",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70317",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70302",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70289",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00631",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70331",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28322"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-28322.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-28322.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1954658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1954658"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239",
                    "reference_id": "1036239",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196793",
                    "reference_id": "2196793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196793"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/47",
                    "reference_id": "47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/47"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/48",
                    "reference_id": "48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/48"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/52",
                    "reference_id": "52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jul/52"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/",
                    "reference_id": "F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213843",
                    "reference_id": "HT213843",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213843"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213844",
                    "reference_id": "HT213844",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213844"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213845",
                    "reference_id": "HT213845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213845"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230609-0009/",
                    "reference_id": "ntap-20230609-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230609-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4354",
                    "reference_id": "RHSA-2023:4354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4628",
                    "reference_id": "RHSA-2023:4628",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4628"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4629",
                    "reference_id": "RHSA-2023:4629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4629"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5598",
                    "reference_id": "RHSA-2023:5598",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5598"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0428",
                    "reference_id": "RHSA-2024:0428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0428"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0585",
                    "reference_id": "RHSA-2024:0585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0585"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1601",
                    "reference_id": "RHSA-2024:1601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1601"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2092",
                    "reference_id": "RHSA-2024:2092",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2092"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093",
                    "reference_id": "RHSA-2024:2093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2093"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6237-1/",
                    "reference_id": "USN-6237-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6237-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6237-3/",
                    "reference_id": "USN-6237-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6237-3/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/",
                    "reference_id": "Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583791?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u9%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583792?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-28322"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49263?format=api",
            "vulnerability_id": "VCID-sh5a-fmna-wffr",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2322",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23204",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23322",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23365",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23154",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23227",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23277",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23143",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22946"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22946.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22946.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1334111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1334111"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589",
                    "reference_id": "1017589",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003175",
                    "reference_id": "2003175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003175"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/29",
                    "reference_id": "29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/29"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/",
                    "reference_id": "APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2384",
                    "reference_id": "AVG-2384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2384"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2385",
                    "reference_id": "AVG-2385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2385"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2386",
                    "reference_id": "AVG-2386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2387",
                    "reference_id": "AVG-2387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2388",
                    "reference_id": "AVG-2388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2389",
                    "reference_id": "AVG-2389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2389"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213183",
                    "reference_id": "HT213183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213183"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211029-0003/",
                    "reference_id": "ntap-20211029-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/",
                    "reference_id": "ntap-20220121-0008",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220121-0008/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4059",
                    "reference_id": "RHSA-2021:4059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0635",
                    "reference_id": "RHSA-2022:0635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1354",
                    "reference_id": "RHSA-2022:1354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1354"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/",
                    "reference_id": "RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-1/",
                    "reference_id": "USN-5079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-2/",
                    "reference_id": "USN-5079-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584001?format=api",
                    "purl": "pkg:deb/debian/curl@7.79.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22946"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sh5a-fmna-wffr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57750?format=api",
            "vulnerability_id": "VCID-sknq-8mm1-6qfe",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20140910A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20140910A.html"
                },
                {
                    "reference_url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1254.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82903",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82864",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82801",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82817",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8283",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82826",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82851",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82858",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82874",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82868",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3613"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-3613.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-3613.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT205031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/kb/HT205031"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-3022"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/69748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/69748"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1136154",
                    "reference_id": "1136154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1136154"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3613",
                    "reference_id": "CVE-2014-3613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3613"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1254",
                    "reference_id": "RHSA-2015:1254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2159",
                    "reference_id": "RHSA-2015:2159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2159"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2346-1/",
                    "reference_id": "USN-2346-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2346-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586725?format=api",
                    "purl": "pkg:deb/debian/curl@7.38.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-3613"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sknq-8mm1-6qfe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/158821?format=api",
            "vulnerability_id": "VCID-snaz-pg1h-8kew",
            "summary": "cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name.",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20160127B.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20160127B.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57557",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57533",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57561",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57423",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57507",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57528",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5756",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57575",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00351",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57555",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0754"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-0754.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-0754.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0754",
                    "reference_id": "CVE-2016-0754",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0754"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-0754"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57264?format=api",
            "vulnerability_id": "VCID-syz5-5y6f-s7er",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19887",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19904",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19882",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20068",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20126",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19854",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19933",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19988",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20007",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19963",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-27534"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-27534.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-27534.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1892351",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1892351"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179069",
                    "reference_id": "2179069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179069"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354",
                    "reference_id": "RHSA-2023:3354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355",
                    "reference_id": "RHSA-2023:3355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3355"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6679",
                    "reference_id": "RHSA-2023:6679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6679"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5964-1/",
                    "reference_id": "USN-5964-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5964-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584288?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584289?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-7?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-27534"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-syz5-5y6f-s7er"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49274?format=api",
            "vulnerability_id": "VCID-t1fk-cbsx-j3gh",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8561",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85539",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85544",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85575",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85589",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85586",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85581",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02588",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85604",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32205"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32205.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32205.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1569946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1569946"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099296",
                    "reference_id": "2099296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099296"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2771",
                    "reference_id": "AVG-2771",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2771"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583413?format=api",
                    "purl": "pkg:deb/debian/curl@7.84.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-32205"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t1fk-cbsx-j3gh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49264?format=api",
            "vulnerability_id": "VCID-t4gn-9fw8-gkc3",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48714",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48662",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48668",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48614",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48641",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.486",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48718",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48669",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48657",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48683",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48665",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22947"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22947.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22947.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1334763",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1334763"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003191",
                    "reference_id": "2003191",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2003191"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Mar/29",
                    "reference_id": "29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Mar/29"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/",
                    "reference_id": "APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2384",
                    "reference_id": "AVG-2384",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2384"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2385",
                    "reference_id": "AVG-2385",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2385"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2386",
                    "reference_id": "AVG-2386",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2386"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2387",
                    "reference_id": "AVG-2387",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2387"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2388",
                    "reference_id": "AVG-2388",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2389",
                    "reference_id": "AVG-2389",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2389"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213183",
                    "reference_id": "HT213183",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213183"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211029-0003/",
                    "reference_id": "ntap-20211029-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211029-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4059",
                    "reference_id": "RHSA-2021:4059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0635",
                    "reference_id": "RHSA-2022:0635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1354",
                    "reference_id": "RHSA-2022:1354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1354"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/",
                    "reference_id": "RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-1/",
                    "reference_id": "USN-5079-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5079-2/",
                    "reference_id": "USN-5079-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5079-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584001?format=api",
                    "purl": "pkg:deb/debian/curl@7.79.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22947"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t4gn-9fw8-gkc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34688?format=api",
            "vulnerability_id": "VCID-t753-w1ha-kqaz",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62241",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62074",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62134",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62166",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62184",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6222",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62189",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62234",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8151"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-8151.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-8151.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178698",
                    "reference_id": "1178698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178698"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-8151"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t753-w1ha-kqaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49267?format=api",
            "vulnerability_id": "VCID-t8t6-9wa3-aub7",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35931",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35907",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35947",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36026",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36057",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3589",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3594",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35964",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00152",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3597",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27775"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-27775.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-27775.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1546268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1546268"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253",
                    "reference_id": "1010253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078388",
                    "reference_id": "2078388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078388"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2685",
                    "reference_id": "AVG-2685",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2685"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8299",
                    "reference_id": "RHSA-2022:8299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8299"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5397-1/",
                    "reference_id": "USN-5397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5397-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582659?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-27775"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t8t6-9wa3-aub7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/97812?format=api",
            "vulnerability_id": "VCID-t9p4-2x7v-yfaq",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56114",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56103",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56112",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56109",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56074",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00331",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56091",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5681",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56789",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56786",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-0167"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-0167.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-0167.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2917232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2917232"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-0167.json",
                    "reference_id": "CVE-2025-0167.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-0167.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8084-1/",
                    "reference_id": "USN-8084-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8084-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584850?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u11?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u11%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582847?format=api",
                    "purl": "pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-0167"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t9p4-2x7v-yfaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19509?format=api",
            "vulnerability_id": "VCID-tcqe-7skm-b3fz",
            "summary": "Out-of-bounds Write\nThis flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38545.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38545.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-38545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96316",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96283",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96295",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.963",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96303",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.2625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96312",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.26747",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96315",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-38545"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2187833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/2187833"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241933",
                    "reference_id": "2241933",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241933"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/34",
                    "reference_id": "34",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/34"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/37",
                    "reference_id": "37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/37"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jan/38",
                    "reference_id": "38",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jan/38"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2845",
                    "reference_id": "AVG-2845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2845"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2846",
                    "reference_id": "AVG-2846",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2846"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545",
                    "reference_id": "CVE-2023-38545",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38545"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2023-38545.html",
                    "reference_id": "CVE-2023-38545.HTML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2023-38545.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/",
                    "reference_id": "high-severity-heap-buffer-overflow-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214036",
                    "reference_id": "HT214036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214036"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214057",
                    "reference_id": "HT214057",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214057"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214058",
                    "reference_id": "HT214058",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214058"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214063",
                    "reference_id": "HT214063",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214063"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231027-0009/",
                    "reference_id": "ntap-20231027-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20231027-0009/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240201-0005/",
                    "reference_id": "ntap-20240201-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240201-0005/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/",
                    "reference_id": "OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5700",
                    "reference_id": "RHSA-2023:5700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5700"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5763",
                    "reference_id": "RHSA-2023:5763",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5763"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:6745",
                    "reference_id": "RHSA-2023:6745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:6745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625",
                    "reference_id": "RHSA-2023:7625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626",
                    "reference_id": "RHSA-2023:7626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7626"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0797",
                    "reference_id": "RHSA-2024:0797",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0797"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2011",
                    "reference_id": "RHSA-2024:2011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2011"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6429-1/",
                    "reference_id": "USN-6429-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6429-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6429-3/",
                    "reference_id": "USN-6429-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6429-3/"
                },
                {
                    "reference_url": "https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868",
                    "reference_id": "viewtopic.php?f=8&t=8868",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"
                        }
                    ],
                    "url": "https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586457?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586458?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586459?format=api",
                    "purl": "pkg:deb/debian/curl@8.3.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-38545"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tcqe-7skm-b3fz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47211?format=api",
            "vulnerability_id": "VCID-tha5-fv3w-sub6",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2004.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2004.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74729",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74642",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74669",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74644",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74675",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7469",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74713",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74693",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74685",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00838",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74722",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2004"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/1"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18",
                    "reference_id": "18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/18"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270500",
                    "reference_id": "2270500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270500"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2384833",
                    "reference_id": "2384833",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2384833"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/",
                    "reference_id": "2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2004.html",
                    "reference_id": "CVE-2024-2004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2004.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2004.json",
                    "reference_id": "CVE-2024-2004.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2004.json"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-20",
                    "reference_id": "GLSA-202409-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-20"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/",
                    "reference_id": "GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214118",
                    "reference_id": "HT214118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214118"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214119",
                    "reference_id": "HT214119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214119"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214120",
                    "reference_id": "HT214120",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214120"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0006/",
                    "reference_id": "ntap-20240524-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2693",
                    "reference_id": "RHSA-2024:2693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2694",
                    "reference_id": "RHSA-2024:2694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2694"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6718-1/",
                    "reference_id": "USN-6718-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6718-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6718-3/",
                    "reference_id": "USN-6718-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6718-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584795?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584796?format=api",
                    "purl": "pkg:deb/debian/curl@8.7.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2004"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tha5-fv3w-sub6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39487?format=api",
            "vulnerability_id": "VCID-tmv3-fzje-sbck",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82245",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82137",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8215",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82172",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82168",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82195",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82221",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82214",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82208",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82244",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3148"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2015-3148.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2015-3148.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213351",
                    "reference_id": "1213351",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213351"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201509-02",
                    "reference_id": "GLSA-201509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201509-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1254",
                    "reference_id": "RHSA-2015:1254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2159",
                    "reference_id": "RHSA-2015:2159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2159"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2591-1/",
                    "reference_id": "USN-2591-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2591-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586640?format=api",
                    "purl": "pkg:deb/debian/curl@7.42.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3148"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tmv3-fzje-sbck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34388?format=api",
            "vulnerability_id": "VCID-tz47-j4ey-t7g6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65747",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65698",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00493",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65733",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6946",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69481",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69466",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69387",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69398",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69444",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14618"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-14618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-14618.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041605",
                    "reference_id": "1041605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1041605"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622707",
                    "reference_id": "1622707",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622707"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327",
                    "reference_id": "908327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2018-14618.html",
                    "reference_id": "CVE-2018-14618.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2018-14618.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4286",
                    "reference_id": "dsa-4286",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4286"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-03",
                    "reference_id": "GLSA-201903-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1880",
                    "reference_id": "RHSA-2019:1880",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1880"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618",
                    "reference_id": "show_bug.cgi?id=CVE-2018-14618",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618"
                },
                {
                    "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014",
                    "reference_id": "SNWLID-2018-0014",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3765-1/",
                    "reference_id": "USN-3765-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3765-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3765-2/",
                    "reference_id": "USN-3765-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3765-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583784?format=api",
                    "purl": "pkg:deb/debian/curl@7.62.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-14618"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47212?format=api",
            "vulnerability_id": "VCID-u4bx-xqb3-vuef",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2398",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83545",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83457",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83472",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8347",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83504",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83519",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83512",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83509",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83544",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2398"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18",
                    "reference_id": "18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/18"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2024/Jul/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498",
                    "reference_id": "2270498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270498"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2402845",
                    "reference_id": "2402845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2402845"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/",
                    "reference_id": "2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/3"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2398.html",
                    "reference_id": "CVE-2024-2398.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2398.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-2398.json",
                    "reference_id": "CVE-2024-2398.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-2398.json"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-20",
                    "reference_id": "GLSA-202409-20",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-20"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/",
                    "reference_id": "GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214118",
                    "reference_id": "HT214118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214118"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214119",
                    "reference_id": "HT214119",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214119"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT214120",
                    "reference_id": "HT214120",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT214120"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240503-0009/",
                    "reference_id": "ntap-20240503-0009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240503-0009/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10135",
                    "reference_id": "RHSA-2024:10135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10135"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:11109",
                    "reference_id": "RHSA-2024:11109",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:11109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2693",
                    "reference_id": "RHSA-2024:2693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2693"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2694",
                    "reference_id": "RHSA-2024:2694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3998",
                    "reference_id": "RHSA-2024:3998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5529",
                    "reference_id": "RHSA-2024:5529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5529"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5654",
                    "reference_id": "RHSA-2024:5654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7213",
                    "reference_id": "RHSA-2024:7213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7213"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:7374",
                    "reference_id": "RHSA-2024:7374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:7374"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6718-1/",
                    "reference_id": "USN-6718-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6718-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6718-2/",
                    "reference_id": "USN-6718-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6718-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6718-3/",
                    "reference_id": "USN-6718-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6718-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584794?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u12?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u12%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584795?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584796?format=api",
                    "purl": "pkg:deb/debian/curl@8.7.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2398"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u4bx-xqb3-vuef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84241?format=api",
            "vulnerability_id": "VCID-u9jp-j1ds-73e7",
            "summary": "curl: URL file scheme drive letter buffer overflow",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9502.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9502.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68058",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6808",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68099",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68077",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68128",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68143",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68167",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68154",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68121",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68157",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00555",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6817",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-9502"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-9502.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-9502.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461321",
                    "reference_id": "1461321",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461321"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-9502"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u9jp-j1ds-73e7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74703?format=api",
            "vulnerability_id": "VCID-v3qf-6wju-1bg8",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80428",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80347",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80429",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80362",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80391",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80402",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80405",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80398",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80353",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80373",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16890"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2018-16890.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2018-16890.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-16890.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-16890.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190315-0001/"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2019/dsa-4386"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/106947"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670252",
                    "reference_id": "1670252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670252"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-10",
                    "reference_id": "ASA-201902-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-11",
                    "reference_id": "ASA-201902-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-12",
                    "reference_id": "ASA-201902-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-13",
                    "reference_id": "ASA-201902-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-9",
                    "reference_id": "ASA-201902-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-873",
                    "reference_id": "AVG-873",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-873"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-874",
                    "reference_id": "AVG-874",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-874"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-875",
                    "reference_id": "AVG-875",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-875"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-876",
                    "reference_id": "AVG-876",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-876"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-877",
                    "reference_id": "AVG-877",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-877"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890",
                    "reference_id": "CVE-2018-16890",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16890"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3701",
                    "reference_id": "RHSA-2019:3701",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3701"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3882-1/",
                    "reference_id": "USN-3882-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3882-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585517?format=api",
                    "purl": "pkg:deb/debian/curl@7.64.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-16890"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v3qf-6wju-1bg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49273?format=api",
            "vulnerability_id": "VCID-v9n1-d6xt-6ubn",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27755",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27831",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27774",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2778",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27925",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27758",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27867",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27873",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-30115"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-30115.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-30115.html"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1557449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1557449"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082223",
                    "reference_id": "2082223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082223"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2706",
                    "reference_id": "AVG-2706",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582920?format=api",
                    "purl": "pkg:deb/debian/curl@7.83.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-30115"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9n1-d6xt-6ubn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96495?format=api",
            "vulnerability_id": "VCID-vbbv-k1r7-kkas",
            "summary": "When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-15224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24629",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24667",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24442",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2451",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24554",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2457",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24526",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2447",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24485",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-15224"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-15224.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-15224.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3480925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3480925"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426410",
                    "reference_id": "2426410",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426410"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-15224.json",
                    "reference_id": "CVE-2025-15224.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-15224.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-2/",
                    "reference_id": "USN-8062-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921945?format=api",
                    "purl": "pkg:deb/debian/curl@8.18.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-15224"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43382?format=api",
            "vulnerability_id": "VCID-vr9x-yqsd-6fc8",
            "summary": "A heap-based buffer overflow in cURL might allow remote attackers\n    to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2486",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2486"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0500.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0500.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78441",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78519",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78447",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78478",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78461",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78488",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78493",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78518",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78499",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78491",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0500"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_2018-70a2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_2018-70a2.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2018-0500.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2018-0500.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041280",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041280"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101",
                    "reference_id": "1597101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903546",
                    "reference_id": "903546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903546"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201807-10",
                    "reference_id": "ASA-201807-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201807-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201807-5",
                    "reference_id": "ASA-201807-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201807-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201807-6",
                    "reference_id": "ASA-201807-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201807-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201807-7",
                    "reference_id": "ASA-201807-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201807-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201807-8",
                    "reference_id": "ASA-201807-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201807-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201807-9",
                    "reference_id": "ASA-201807-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201807-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-729",
                    "reference_id": "AVG-729",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-729"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-730",
                    "reference_id": "AVG-730",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-730"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-731",
                    "reference_id": "AVG-731",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-731"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-732",
                    "reference_id": "AVG-732",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-732"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-733",
                    "reference_id": "AVG-733",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-733"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-734",
                    "reference_id": "AVG-734",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-734"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500",
                    "reference_id": "CVE-2018-0500",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201807-04",
                    "reference_id": "GLSA-201807-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201807-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3710-1/",
                    "reference_id": "USN-3710-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3710-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586696?format=api",
                    "purl": "pkg:deb/debian/curl@7.61.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.61.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-0500"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9x-yqsd-6fc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34696?format=api",
            "vulnerability_id": "VCID-vxpj-xygq-9be2",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84789",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84774",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8481",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84832",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84839",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84857",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8487",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84871",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8615"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8615.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8615.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370",
                    "reference_id": "1388370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94096",
                    "reference_id": "94096",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94096"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102A.html",
                    "reference_id": "adv_20161102A.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102A.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8615.patch",
                    "reference_id": "CVE-2016-8615.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8615.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8615",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8615"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34699?format=api",
            "vulnerability_id": "VCID-vyk2-s5ut-ubbz",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81967",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82069",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82024",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82031",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82051",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82068",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81978",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82001",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81997",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8618"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8618.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378",
                    "reference_id": "1388378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8618"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34394?format=api",
            "vulnerability_id": "VCID-w8ks-xk66-r3fm",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82137",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82071",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82104",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.821",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82126",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82134",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82153",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82144",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82175",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01673",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82083",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3823"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2019-3823.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2019-3823.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2019-3823.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2019-3823.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190315-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190315-0001/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2019/dsa-4386"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/106950"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670256",
                    "reference_id": "1670256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670256"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-10",
                    "reference_id": "ASA-201902-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-11",
                    "reference_id": "ASA-201902-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-12",
                    "reference_id": "ASA-201902-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-13",
                    "reference_id": "ASA-201902-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-13"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-9",
                    "reference_id": "ASA-201902-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-873",
                    "reference_id": "AVG-873",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-873"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-874",
                    "reference_id": "AVG-874",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-874"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-875",
                    "reference_id": "AVG-875",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-875"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-876",
                    "reference_id": "AVG-876",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-876"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-877",
                    "reference_id": "AVG-877",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-877"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823",
                    "reference_id": "CVE-2019-3823",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3823"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201903-03",
                    "reference_id": "GLSA-201903-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201903-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:3701",
                    "reference_id": "RHSA-2019:3701",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:3701"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3882-1/",
                    "reference_id": "USN-3882-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3882-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585517?format=api",
                    "purl": "pkg:deb/debian/curl@7.64.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-3823"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ks-xk66-r3fm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/161813?format=api",
            "vulnerability_id": "VCID-wc8j-qyp4-tqbd",
            "summary": "Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69852",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.698",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69842",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6974",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69751",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69767",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69743",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69791",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69807",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6983",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00612",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69815",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4802"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20160530.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_20160530.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-4802.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-4802.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/90997",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/90997"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036008",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1036008"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4802",
                    "reference_id": "CVE-2016-4802",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4802"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-4802"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84479?format=api",
            "vulnerability_id": "VCID-wdhs-h36p-qbga",
            "summary": "curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2628.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2628.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74503",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74535",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74509",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74541",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74557",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74579",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7456",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74552",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7459",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00831",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74597",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2628"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422464",
                    "reference_id": "1422464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0847",
                    "reference_id": "RHSA-2017:0847",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0847"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-2628"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdhs-h36p-qbga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72616?format=api",
            "vulnerability_id": "VCID-wgma-bycg-1qb1",
            "summary": "curl: curl netrc password leak",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11053.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11053.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11053",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76408",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76336",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76315",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76348",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76362",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76388",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76366",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76361",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76402",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76306",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11053"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089682",
                    "reference_id": "1089682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089682"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191",
                    "reference_id": "2331191",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
                },
                {
                    "reference_url": "https://hackerone.com/reports/2829063",
                    "reference_id": "2829063",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/2829063"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-11053.html",
                    "reference_id": "CVE-2024-11053.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-11053.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2024-11053.json",
                    "reference_id": "CVE-2024-11053.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2024-11053.json"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1671",
                    "reference_id": "RHSA-2025:1671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2025:1673",
                    "reference_id": "RHSA-2025:1673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2025:1673"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7162-1/",
                    "reference_id": "USN-7162-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7162-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586387?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u10?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u10%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586388?format=api",
                    "purl": "pkg:deb/debian/curl@8.11.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.11.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-11053"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wgma-bycg-1qb1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39486?format=api",
            "vulnerability_id": "VCID-wh98-pw9h-cyfx",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3145.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3145.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3145",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98424",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98404",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98407",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98409",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98412",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98415",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98416",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9842",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.63704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98425",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3145"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2015-3145.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2015-3145.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213347",
                    "reference_id": "1213347",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213347"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201509-02",
                    "reference_id": "GLSA-201509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201509-02"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2591-1/",
                    "reference_id": "USN-2591-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2591-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586640?format=api",
                    "purl": "pkg:deb/debian/curl@7.42.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3145"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wh98-pw9h-cyfx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59717?format=api",
            "vulnerability_id": "VCID-wrh2-77dv-hbdz",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73097",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74905",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74872",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74919",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74941",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00852",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74918",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76291",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00949",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76294",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00981",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76812",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8817"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_2017-ae72.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_2017-ae72.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2017-8817.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2017-8817.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817"
                },
                {
                    "reference_url": "http://security.cucumberlinux.com/security/details.php?id=162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "http://security.cucumberlinux.com/security/details.php?id=162"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2017/dsa-4051",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2017/dsa-4051"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102057"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1039897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1039897"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1515760",
                    "reference_id": "1515760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1515760"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-33",
                    "reference_id": "ASA-201711-33",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-33"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-34",
                    "reference_id": "ASA-201711-34",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-34"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-35",
                    "reference_id": "ASA-201711-35",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-35"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-36",
                    "reference_id": "ASA-201711-36",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-36"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-37",
                    "reference_id": "ASA-201711-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201711-38",
                    "reference_id": "ASA-201711-38",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201711-38"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-521",
                    "reference_id": "AVG-521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-521"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-522",
                    "reference_id": "AVG-522",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-522"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-523",
                    "reference_id": "AVG-523",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-523"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-524",
                    "reference_id": "AVG-524",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-524"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-525",
                    "reference_id": "AVG-525",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-525"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-526",
                    "reference_id": "AVG-526",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-526"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8817",
                    "reference_id": "CVE-2017-8817",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8817"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201712-04",
                    "reference_id": "GLSA-201712-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201712-04"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3498-1/",
                    "reference_id": "USN-3498-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3498-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3498-2/",
                    "reference_id": "USN-3498-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3498-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585790?format=api",
                    "purl": "pkg:deb/debian/curl@7.57.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-8817"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wrh2-77dv-hbdz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47225?format=api",
            "vulnerability_id": "VCID-wwam-tcmv-kqhc",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91427",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91402",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91403",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91423",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92281",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9225",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92286",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92257",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92262",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92265",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92277",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5482"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/CVE-2019-5482.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/CVE-2019-5482.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2019-5482.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2019-5482.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/684603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/684603"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2020/Feb/36",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2020/Feb/36"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191004-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191004-0003/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2020/dsa-4633",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2020/dsa-4633"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2020.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749652",
                    "reference_id": "1749652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1749652"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010",
                    "reference_id": "940010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1982",
                    "reference_id": "AVG-1982",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1982"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5482",
                    "reference_id": "CVE-2019-5482",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5482"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202003-29",
                    "reference_id": "GLSA-202003-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202003-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0250",
                    "reference_id": "RHSA-2020:0250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1792",
                    "reference_id": "RHSA-2020:1792",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1792"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3916",
                    "reference_id": "RHSA-2020:3916",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3916"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0759",
                    "reference_id": "RHSA-2021:0759",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0759"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0877",
                    "reference_id": "RHSA-2021:0877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949",
                    "reference_id": "RHSA-2021:0949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0949"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1027",
                    "reference_id": "RHSA-2021:1027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1027"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4129-1/",
                    "reference_id": "USN-4129-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4129-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4129-2/",
                    "reference_id": "USN-4129-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4129-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585101?format=api",
                    "purl": "pkg:deb/debian/curl@7.66.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-5482"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wwam-tcmv-kqhc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96485?format=api",
            "vulnerability_id": "VCID-x57x-w8g8-7ybz",
            "summary": "When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07127",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07177",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07206",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07234",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07222",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0715",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14524"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-14524.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-14524.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/3459417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/3459417"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426407",
                    "reference_id": "2426407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2426407"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2025-14524.json",
                    "reference_id": "CVE-2025-14524.json",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2025-14524.json"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8062-1/",
                    "reference_id": "USN-8062-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8062-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921943?format=api",
                    "purl": "pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-14524"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x57x-w8g8-7ybz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60271?format=api",
            "vulnerability_id": "VCID-xkw8-ptjd-sfb6",
            "summary": "libcurl is affected by a buffer overflow in the handling of URLs for the\n    TFTP protocol, which could be exploited to compromise a user's system.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88154",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88083",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88092",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88108",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88114",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88133",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88139",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88148",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88141",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88143",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88156",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-1061"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2006-1061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2006-1061.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200603-19",
                    "reference_id": "GLSA-200603-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200603-19"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585374?format=api",
                    "purl": "pkg:deb/debian/curl@7.15.3-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2006-1061"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xkw8-ptjd-sfb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90471?format=api",
            "vulnerability_id": "VCID-xm7g-6w3z-37fs",
            "summary": "libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3564.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3564.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3564",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70442",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70329",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70341",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70336",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70381",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70405",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7039",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70433",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-3564"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2007-3564.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2007-3564.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3564",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3564"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/484-1/",
                    "reference_id": "USN-484-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/484-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583968?format=api",
                    "purl": "pkg:deb/debian/curl@7.16.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.16.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2007-3564"
            ],
            "risk_score": 1.1,
            "exploitability": "0.5",
            "weighted_severity": "2.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xm7g-6w3z-37fs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57258?format=api",
            "vulnerability_id": "VCID-xpss-yndr-mycj",
            "summary": "Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43551.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43551.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43551",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12697",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12923",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12972",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12773",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12852",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12902",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12868",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12831",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12786",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1269",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-43551"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-43551.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-43551.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1755083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1755083"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026829",
                    "reference_id": "1026829",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152639",
                    "reference_id": "2152639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152639"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-12",
                    "reference_id": "GLSA-202310-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-12"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
                    "reference_id": "ntap-20230427-0007",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230427-0007/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354",
                    "reference_id": "RHSA-2023:3354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3354"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355",
                    "reference_id": "RHSA-2023:3355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3355"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/",
                    "reference_id": "TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5788-1/",
                    "reference_id": "USN-5788-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5788-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584156?format=api",
                    "purl": "pkg:deb/debian/curl@7.86.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-43551"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpss-yndr-mycj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39484?format=api",
            "vulnerability_id": "VCID-xspf-45t1-2uhf",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87571",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.875",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8751",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87524",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87526",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87545",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87552",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87563",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87559",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87556",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8757",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3143"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2015-3143.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2015-3143.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213306",
                    "reference_id": "1213306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213306"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201509-02",
                    "reference_id": "GLSA-201509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201509-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1254",
                    "reference_id": "RHSA-2015:1254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2159",
                    "reference_id": "RHSA-2015:2159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2159"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2591-1/",
                    "reference_id": "USN-2591-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2591-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586640?format=api",
                    "purl": "pkg:deb/debian/curl@7.42.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3143"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xspf-45t1-2uhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49275?format=api",
            "vulnerability_id": "VCID-xzay-sjpy-3yce",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89199",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89143",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89158",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89161",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89178",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89193",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89189",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89187",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04546",
                            "scoring_system": "epss",
                            "scoring_elements": "0.892",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32206"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32206.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32206.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1570651",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1570651"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300",
                    "reference_id": "2099300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099300"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/02/15/3",
                    "reference_id": "3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/02/15/3"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2817",
                    "reference_id": "AVG-2817",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2817"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6157",
                    "reference_id": "RHSA-2022:6157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6159",
                    "reference_id": "RHSA-2022:6159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6159"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3460",
                    "reference_id": "RHSA-2023:3460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3460"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583413?format=api",
                    "purl": "pkg:deb/debian/curl@7.84.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-32206"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzay-sjpy-3yce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11000?format=api",
            "vulnerability_id": "VCID-y32p-52ps-4ug4",
            "summary": "Use of Incorrectly-Resolved Name or Reference\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73012",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73042",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73117",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73107",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73064",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7307",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73091",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73066",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73016",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73053",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00746",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73021",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22924"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2021-22924.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2021-22924.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1223565",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1223565"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981460",
                    "reference_id": "1981460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981460"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492",
                    "reference_id": "991492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-59",
                    "reference_id": "ASA-202107-59",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-59"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-60",
                    "reference_id": "ASA-202107-60",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-61",
                    "reference_id": "ASA-202107-61",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-62",
                    "reference_id": "ASA-202107-62",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-63",
                    "reference_id": "ASA-202107-63",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-64",
                    "reference_id": "ASA-202107-64",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-64"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2194",
                    "reference_id": "AVG-2194",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2194"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2195",
                    "reference_id": "AVG-2195",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2195"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2196",
                    "reference_id": "AVG-2196",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2196"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2197",
                    "reference_id": "AVG-2197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2197"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2198",
                    "reference_id": "AVG-2198",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2198"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2199",
                    "reference_id": "AVG-2199",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2199"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924",
                    "reference_id": "CVE-2021-22924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22924"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/",
                    "reference_id": "FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210902-0003/",
                    "reference_id": "ntap-20210902-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210902-0003/"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E",
                    "reference_id": "r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E",
                    "reference_id": "r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E",
                    "reference_id": "rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E",
                    "reference_id": "rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3582",
                    "reference_id": "RHSA-2021:3582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1354",
                    "reference_id": "RHSA-2022:1354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1354"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf",
                    "reference_id": "ssa-484086.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf",
                    "reference_id": "ssa-732250.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5021-1/",
                    "reference_id": "USN-5021-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5021-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584001?format=api",
                    "purl": "pkg:deb/debian/curl@7.79.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-22924"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49277?format=api",
            "vulnerability_id": "VCID-y4x5-n5m2-x7bq",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37863",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37916",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37942",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37819",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3787",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37883",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37898",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37862",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37837",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37884",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32208"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-32208.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-32208.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1590071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://hackerone.com/reports/1590071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306",
                    "reference_id": "2099306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099306"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/28",
                    "reference_id": "28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/28"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/41",
                    "reference_id": "41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Oct/41"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2817",
                    "reference_id": "AVG-2817",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Unknown",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2817"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/",
                    "reference_id": "BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5197",
                    "reference_id": "dsa-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5197"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213488",
                    "reference_id": "HT213488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213488"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220915-0003/",
                    "reference_id": "ntap-20220915-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220915-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6157",
                    "reference_id": "RHSA-2022:6157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6159",
                    "reference_id": "RHSA-2022:6159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6159"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5495-1/",
                    "reference_id": "USN-5495-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5495-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5499-1/",
                    "reference_id": "USN-5499-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5499-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582658?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583413?format=api",
                    "purl": "pkg:deb/debian/curl@7.84.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-32208"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/147275?format=api",
            "vulnerability_id": "VCID-ya9y-nav3-37hh",
            "summary": "curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1263",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90563",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90504",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90519",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90525",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90538",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90552",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05846",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90546",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1263"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-1263.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-1263.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582846?format=api",
                    "purl": "pkg:deb/debian/curl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-1263"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ya9y-nav3-37hh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49282?format=api",
            "vulnerability_id": "VCID-yaas-j3qk-kfdg",
            "summary": "Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25945",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25934",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26002",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26063",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00093",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25964",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31155",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42916"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2022-42916.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2022-42916.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1730660",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/1730660"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/12/21/1",
                    "reference_id": "1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/12/21/1"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/19",
                    "reference_id": "19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/19"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/20",
                    "reference_id": "20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Jan/20"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416",
                    "reference_id": "2135416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135416"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/",
                    "reference_id": "37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202212-01",
                    "reference_id": "GLSA-202212-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202212-01"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213604",
                    "reference_id": "HT213604",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213605",
                    "reference_id": "HT213605",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213605"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/",
                    "reference_id": "HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0010/",
                    "reference_id": "ntap-20221209-0010",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0010/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/",
                    "reference_id": "Q27V5YYMXUVI6PRZQVECON32XPVWTKDK",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840",
                    "reference_id": "RHSA-2022:8840",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8840"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5702-1/",
                    "reference_id": "USN-5702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583300?format=api",
                    "purl": "pkg:deb/debian/curl@7.86.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-42916"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yaas-j3qk-kfdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39488?format=api",
            "vulnerability_id": "VCID-yubp-g4rt-c3e6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3236.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3236.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89176",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89112",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89119",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89134",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89155",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8916",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8917",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89166",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89164",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3236"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2015-3236.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2015-3236.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233816",
                    "reference_id": "1233816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233816"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201509-02",
                    "reference_id": "GLSA-201509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201509-02"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583844?format=api",
                    "purl": "pkg:deb/debian/curl@7.43.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.43.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3236"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yubp-g4rt-c3e6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50086?format=api",
            "vulnerability_id": "VCID-yvdd-ataf-ckf1",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36827",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36823",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36798",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36844",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44841",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44803",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44855",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44858",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44875",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44761",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44863",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-8231"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2020-8231.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2020-8231.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://hackerone.com/reports/948876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://hackerone.com/reports/948876"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868032",
                    "reference_id": "1868032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868032"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831",
                    "reference_id": "968831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8231",
                    "reference_id": "CVE-2020-8231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8231"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202012-14",
                    "reference_id": "GLSA-202012-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202012-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1610",
                    "reference_id": "RHSA-2021:1610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1610"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4466-1/",
                    "reference_id": "USN-4466-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4466-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4466-2/",
                    "reference_id": "USN-4466-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4466-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4665-1/",
                    "reference_id": "USN-4665-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4665-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583866?format=api",
                    "purl": "pkg:deb/debian/curl@7.72.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-8231"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yvdd-ataf-ckf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34706?format=api",
            "vulnerability_id": "VCID-yxks-8529-23bj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81322",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81228",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81251",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8125",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81278",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81283",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81304",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8129",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8132",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8625"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8625.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8625.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392",
                    "reference_id": "1388392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8625"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41496?format=api",
            "vulnerability_id": "VCID-z49y-v1gh-h7gj",
            "summary": "Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86985",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86912",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86923",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86942",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86936",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86956",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86963",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86977",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86971",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86966",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86981",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2174"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2013-2174.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2013-2174.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=965640",
                    "reference_id": "965640",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=965640"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-14",
                    "reference_id": "GLSA-201401-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0983",
                    "reference_id": "RHSA-2013:0983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0983"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1894-1/",
                    "reference_id": "USN-1894-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1894-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582362?format=api",
                    "purl": "pkg:deb/debian/curl@7.31.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.31.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-2174"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z49y-v1gh-h7gj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51946?format=api",
            "vulnerability_id": "VCID-z8h3-fdj8-xuaa",
            "summary": "Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71522",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71431",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71457",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71471",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71483",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71506",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71472",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71517",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0138"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-0138.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-0138.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079148",
                    "reference_id": "1079148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1079148"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728",
                    "reference_id": "742728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-21",
                    "reference_id": "GLSA-201406-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0561",
                    "reference_id": "RHSA-2014:0561",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0561"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2167-1/",
                    "reference_id": "USN-2167-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2167-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585465?format=api",
                    "purl": "pkg:deb/debian/curl@7.36.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.36.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-0138"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z8h3-fdj8-xuaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34698?format=api",
            "vulnerability_id": "VCID-zxz2-xfpd-pbay",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19714",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19763",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19567",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19619",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19623",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19482",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19491",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8617"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8617.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8617.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377",
                    "reference_id": "1388377",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94097",
                    "reference_id": "94097",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94097"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102C.html",
                    "reference_id": "adv_20161102C.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102C.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8617.patch",
                    "reference_id": "CVE-2016-8617.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8617.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8617",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583608?format=api",
                    "purl": "pkg:deb/debian/curl@7.51.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582363?format=api",
                    "purl": "pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-4e1k-7bj9-hfch"
                        },
                        {
                            "vulnerability": "VCID-4gze-cwtp-2bgr"
                        },
                        {
                            "vulnerability": "VCID-4seq-hvbx-7fg8"
                        },
                        {
                            "vulnerability": "VCID-56wg-yafz-gkgx"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-ddgz-rczw-jqfw"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-pwn6-j8vf-rufk"
                        },
                        {
                            "vulnerability": "VCID-qbpd-star-6fgn"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        },
                        {
                            "vulnerability": "VCID-xpss-yndr-mycj"
                        },
                        {
                            "vulnerability": "VCID-yaas-j3qk-kfdg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582364?format=api",
                    "purl": "pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-2szj-xvgq-pkfr"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-6we4-n888-6qhe"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-ksap-zrmb-ebcu"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582365?format=api",
                    "purl": "pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2cx5-1qnw-uufj"
                        },
                        {
                            "vulnerability": "VCID-5xp7-mcsa-uqd4"
                        },
                        {
                            "vulnerability": "VCID-8zks-th64-33b8"
                        },
                        {
                            "vulnerability": "VCID-amgy-dw6h-6ydf"
                        },
                        {
                            "vulnerability": "VCID-etzn-uhck-h7b2"
                        },
                        {
                            "vulnerability": "VCID-kt4b-7ffh-4bch"
                        },
                        {
                            "vulnerability": "VCID-mkyr-w79c-qqfz"
                        },
                        {
                            "vulnerability": "VCID-nvzd-v3bs-6qek"
                        },
                        {
                            "vulnerability": "VCID-qpux-jh6k-8qhx"
                        },
                        {
                            "vulnerability": "VCID-vbbv-k1r7-kkas"
                        },
                        {
                            "vulnerability": "VCID-x57x-w8g8-7ybz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582366?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582367?format=api",
                    "purl": "pkg:deb/debian/curl@8.19.0-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067521?format=api",
                    "purl": "pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-8617"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"
}