| 0 |
| url |
VCID-2cx5-1qnw-uufj |
| vulnerability_id |
VCID-2cx5-1qnw-uufj |
| summary |
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1965 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17246 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17194 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16802 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16949 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16923 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19261 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19223 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19316 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1965 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-1965.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-1965.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-1965
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj |
|
| 1 |
| url |
VCID-47qb-2qkw-1qej |
| vulnerability_id |
VCID-47qb-2qkw-1qej |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28321 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53057 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52966 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52991 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53009 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53003 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53052 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.5302 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28321 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.1.0 |
| purl |
pkg:generic/curl.se/curl@8.1.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 1 |
| vulnerability |
VCID-4seq-hvbx-7fg8 |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-bz4u-6rft-s3a8 |
|
| 7 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 8 |
| vulnerability |
VCID-gnx2-djyk-uyaf |
|
| 9 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 10 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 11 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 12 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 13 |
| vulnerability |
VCID-qdcn-2u3v-b3cv |
|
| 14 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 15 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 16 |
| vulnerability |
VCID-tcqe-7skm-b3fz |
|
| 17 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 18 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 19 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 20 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 21 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0 |
|
|
| aliases |
CVE-2023-28321
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej |
|
| 2 |
| url |
VCID-4seq-hvbx-7fg8 |
| vulnerability_id |
VCID-4seq-hvbx-7fg8 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42459 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42478 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.4466 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44703 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44716 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44713 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44723 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46219 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.5.0 |
| purl |
pkg:generic/curl.se/curl@8.5.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-2vwu-y316-gbb2 |
|
| 3 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 4 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 5 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 6 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 7 |
| vulnerability |
VCID-b69q-9yrr-myf7 |
|
| 8 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 9 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 10 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 11 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 12 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 13 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 14 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 15 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 16 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 17 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 18 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 19 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.5.0 |
|
|
| aliases |
CVE-2023-46219
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4seq-hvbx-7fg8 |
|
| 3 |
| url |
VCID-5xp7-mcsa-uqd4 |
| vulnerability_id |
VCID-5xp7-mcsa-uqd4 |
| summary |
When doing TLS related transfers with reused easy or multi handles and
altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14819 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13995 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13771 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13854 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13938 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13991 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13948 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1405 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14819 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14819
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5xp7-mcsa-uqd4 |
|
| 4 |
| url |
VCID-6we4-n888-6qhe |
| vulnerability_id |
VCID-6we4-n888-6qhe |
| summary |
libcurl: Buffer Overflow in libcurl via zlib Integer Overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6327 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63305 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63306 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63788 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63815 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63772 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0725 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-0725.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-0725.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.12.0 |
| purl |
pkg:generic/curl.se/curl@8.12.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 4 |
| vulnerability |
VCID-9mjz-apkm-g7h1 |
|
| 5 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 6 |
| vulnerability |
VCID-ksap-zrmb-ebcu |
|
| 7 |
| vulnerability |
VCID-kt4b-7ffh-4bch |
|
| 8 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 9 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 10 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 11 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 12 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.12.0 |
|
|
| aliases |
CVE-2025-0725
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe |
|
| 5 |
| url |
VCID-75nw-4e2d-zqgg |
| vulnerability_id |
VCID-75nw-4e2d-zqgg |
| summary |
curl: libcurl: ASN.1 date parser overread |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7264 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73978 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73943 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73973 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75437 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75409 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75429 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75407 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75396 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7264 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://curl.se/docs/CVE-2024-7264.html |
| reference_id |
CVE-2024-7264.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-7264.html |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.9.1 |
| purl |
pkg:generic/curl.se/curl@8.9.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 5 |
| vulnerability |
VCID-9mjz-apkm-g7h1 |
|
| 6 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 7 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 8 |
| vulnerability |
VCID-kt4b-7ffh-4bch |
|
| 9 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 10 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 11 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 12 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 13 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 14 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 15 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 16 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.9.1 |
|
|
| aliases |
CVE-2024-7264
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-75nw-4e2d-zqgg |
|
| 6 |
| url |
VCID-8zks-th64-33b8 |
| vulnerability_id |
VCID-8zks-th64-33b8 |
| summary |
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3784 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03044 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03081 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03053 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03037 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03659 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03709 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03683 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3784 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3784.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3784.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3784
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8 |
|
| 7 |
| url |
VCID-bz4u-6rft-s3a8 |
| vulnerability_id |
VCID-bz4u-6rft-s3a8 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38039 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93887 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93845 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93847 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93856 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.9386 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93865 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38039 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.3.0 |
| purl |
pkg:generic/curl.se/curl@8.3.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 1 |
| vulnerability |
VCID-4seq-hvbx-7fg8 |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 7 |
| vulnerability |
VCID-gnx2-djyk-uyaf |
|
| 8 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 9 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 10 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 11 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 12 |
| vulnerability |
VCID-qdcn-2u3v-b3cv |
|
| 13 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 14 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 15 |
| vulnerability |
VCID-tcqe-7skm-b3fz |
|
| 16 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 17 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 18 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 19 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 20 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.3.0 |
|
|
| aliases |
CVE-2023-38039
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bz4u-6rft-s3a8 |
|
| 8 |
| url |
VCID-ddgz-rczw-jqfw |
| vulnerability_id |
VCID-ddgz-rczw-jqfw |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28320 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67581 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67526 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6757 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67546 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28320 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.1.0 |
| purl |
pkg:generic/curl.se/curl@8.1.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 1 |
| vulnerability |
VCID-4seq-hvbx-7fg8 |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-bz4u-6rft-s3a8 |
|
| 7 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 8 |
| vulnerability |
VCID-gnx2-djyk-uyaf |
|
| 9 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 10 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 11 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 12 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 13 |
| vulnerability |
VCID-qdcn-2u3v-b3cv |
|
| 14 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 15 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 16 |
| vulnerability |
VCID-tcqe-7skm-b3fz |
|
| 17 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 18 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 19 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 20 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 21 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0 |
|
|
| aliases |
CVE-2023-28320
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw |
|
| 9 |
| url |
VCID-etzn-uhck-h7b2 |
| vulnerability_id |
VCID-etzn-uhck-h7b2 |
| summary |
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3783 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.035 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03521 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0352 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04144 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04175 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3783 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3783.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3783.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3783
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-etzn-uhck-h7b2 |
|
| 10 |
| url |
VCID-gnx2-djyk-uyaf |
| vulnerability_id |
VCID-gnx2-djyk-uyaf |
| summary |
Cookie injection with none file
This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.
libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.
libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).
If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle does not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).
Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.49036 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48991 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48944 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48998 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48995 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.49012 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48985 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.4.0 |
| purl |
pkg:generic/curl.se/curl@8.4.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 1 |
| vulnerability |
VCID-4seq-hvbx-7fg8 |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 7 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 8 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 9 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 10 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 11 |
| vulnerability |
VCID-qdcn-2u3v-b3cv |
|
| 12 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 13 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 14 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 15 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 16 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 17 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 18 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.4.0 |
|
|
| aliases |
CVE-2023-38546
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf |
|
| 11 |
| url |
VCID-hrsy-694u-2fec |
| vulnerability_id |
VCID-hrsy-694u-2fec |
| summary |
curl: OCSP stapling bypass with GnuTLS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66629 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66587 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66559 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66606 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66638 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66626 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66593 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8096 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://curl.se/docs/CVE-2024-8096.html |
| reference_id |
CVE-2024-8096.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-8096.html |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.10.0 |
| purl |
pkg:generic/curl.se/curl@8.10.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 5 |
| vulnerability |
VCID-9mjz-apkm-g7h1 |
|
| 6 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 7 |
| vulnerability |
VCID-kt4b-7ffh-4bch |
|
| 8 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 9 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 10 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 11 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 12 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 13 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 14 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 15 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.10.0 |
|
|
| aliases |
CVE-2024-8096
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hrsy-694u-2fec |
|
| 12 |
| url |
VCID-m15r-v9sr-2bbn |
| vulnerability_id |
VCID-m15r-v9sr-2bbn |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55114 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55097 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55122 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55134 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28319 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.1.0 |
| purl |
pkg:generic/curl.se/curl@8.1.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 1 |
| vulnerability |
VCID-4seq-hvbx-7fg8 |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-bz4u-6rft-s3a8 |
|
| 7 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 8 |
| vulnerability |
VCID-gnx2-djyk-uyaf |
|
| 9 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 10 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 11 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 12 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 13 |
| vulnerability |
VCID-qdcn-2u3v-b3cv |
|
| 14 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 15 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 16 |
| vulnerability |
VCID-tcqe-7skm-b3fz |
|
| 17 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 18 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 19 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 20 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 21 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0 |
|
|
| aliases |
CVE-2023-28319
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m15r-v9sr-2bbn |
|
| 13 |
| url |
VCID-mkyr-w79c-qqfz |
| vulnerability_id |
VCID-mkyr-w79c-qqfz |
| summary |
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14017 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00579 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00593 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00595 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00587 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00586 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00583 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.006 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14017 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14017
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz |
|
| 14 |
| url |
VCID-nvzd-v3bs-6qek |
| vulnerability_id |
VCID-nvzd-v3bs-6qek |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10292 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10237 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1026 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10399 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10366 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15079
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek |
|
| 15 |
| url |
VCID-pwn6-j8vf-rufk |
| vulnerability_id |
VCID-pwn6-j8vf-rufk |
| summary |
curl: HSTS subdomain overwrites parent cache entry |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9681 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72605 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72522 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72539 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72515 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72554 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72566 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.7259 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72562 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9681 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://curl.se/docs/CVE-2024-9681.html |
| reference_id |
CVE-2024-9681.html |
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-9681.html |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.11.0 |
| purl |
pkg:generic/curl.se/curl@8.11.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 5 |
| vulnerability |
VCID-9mjz-apkm-g7h1 |
|
| 6 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 7 |
| vulnerability |
VCID-ksap-zrmb-ebcu |
|
| 8 |
| vulnerability |
VCID-kt4b-7ffh-4bch |
|
| 9 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 10 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 11 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 12 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 13 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 14 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 15 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.11.0 |
|
|
| aliases |
CVE-2024-9681
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pwn6-j8vf-rufk |
|
| 16 |
| url |
VCID-qdcn-2u3v-b3cv |
| vulnerability_id |
VCID-qdcn-2u3v-b3cv |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46218 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60632 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60627 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60612 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60591 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62656 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62672 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62606 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62641 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46218 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.5.0 |
| purl |
pkg:generic/curl.se/curl@8.5.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-2vwu-y316-gbb2 |
|
| 3 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 4 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 5 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 6 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 7 |
| vulnerability |
VCID-b69q-9yrr-myf7 |
|
| 8 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 9 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 10 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 11 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 12 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 13 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 14 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 15 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 16 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 17 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 18 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 19 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.5.0 |
|
|
| aliases |
CVE-2023-46218
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdcn-2u3v-b3cv |
|
| 17 |
| url |
VCID-qpux-jh6k-8qhx |
| vulnerability_id |
VCID-qpux-jh6k-8qhx |
| summary |
curl: Curl missing SFTP host verification with wolfSSH backend |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05191 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05467 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05252 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05309 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05274 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0526 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05246 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-10966
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpux-jh6k-8qhx |
|
| 18 |
| url |
VCID-s73y-y7v7-43cm |
| vulnerability_id |
VCID-s73y-y7v7-43cm |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70331 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70238 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70255 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70232 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70278 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70294 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70302 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70289 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28322 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.1.0 |
| purl |
pkg:generic/curl.se/curl@8.1.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 1 |
| vulnerability |
VCID-4seq-hvbx-7fg8 |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-bz4u-6rft-s3a8 |
|
| 7 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 8 |
| vulnerability |
VCID-gnx2-djyk-uyaf |
|
| 9 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 10 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 11 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 12 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 13 |
| vulnerability |
VCID-qdcn-2u3v-b3cv |
|
| 14 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 15 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 16 |
| vulnerability |
VCID-tcqe-7skm-b3fz |
|
| 17 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 18 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 19 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 20 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 21 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0 |
|
|
| aliases |
CVE-2023-28322
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm |
|
| 19 |
| url |
VCID-t9p4-2x7v-yfaq |
| vulnerability_id |
VCID-t9p4-2x7v-yfaq |
| summary |
|
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56103 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56114 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56109 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56074 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56786 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.5681 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56838 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0167 |
|
| 1 |
| reference_url |
https://curl.se/docs/CVE-2025-0167.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-0167.html |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.12.0 |
| purl |
pkg:generic/curl.se/curl@8.12.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 4 |
| vulnerability |
VCID-9mjz-apkm-g7h1 |
|
| 5 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 6 |
| vulnerability |
VCID-ksap-zrmb-ebcu |
|
| 7 |
| vulnerability |
VCID-kt4b-7ffh-4bch |
|
| 8 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 9 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 10 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 11 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 12 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.12.0 |
|
|
| aliases |
CVE-2025-0167
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9p4-2x7v-yfaq |
|
| 20 |
| url |
VCID-tcqe-7skm-b3fz |
| vulnerability_id |
VCID-tcqe-7skm-b3fz |
| summary |
Out-of-bounds Write
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96312 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96278 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96283 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96295 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.963 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96303 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.26747 |
| scoring_system |
epss |
| scoring_elements |
0.96315 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38545 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://curl.se/docs/CVE-2023-38545.html |
| reference_id |
CVE-2023-38545.HTML |
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
High |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/ |
|
|
| url |
https://curl.se/docs/CVE-2023-38545.html |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.4.0 |
| purl |
pkg:generic/curl.se/curl@8.4.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 1 |
| vulnerability |
VCID-4seq-hvbx-7fg8 |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 7 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 8 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 9 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 10 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 11 |
| vulnerability |
VCID-qdcn-2u3v-b3cv |
|
| 12 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 13 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 14 |
| vulnerability |
VCID-tha5-fv3w-sub6 |
|
| 15 |
| vulnerability |
VCID-u4bx-xqb3-vuef |
|
| 16 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 17 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 18 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.4.0 |
|
|
| aliases |
CVE-2023-38545
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tcqe-7skm-b3fz |
|
| 21 |
| url |
VCID-tha5-fv3w-sub6 |
| vulnerability_id |
VCID-tha5-fv3w-sub6 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74722 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74642 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74669 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74675 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.7469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74685 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2004 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://curl.se/docs/CVE-2024-2004.html |
| reference_id |
CVE-2024-2004.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2004.html |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.7.0 |
| purl |
pkg:generic/curl.se/curl@8.7.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8m6a-ej6a-g3df |
|
| 6 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 7 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 8 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 9 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 10 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 11 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 12 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 13 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 14 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 15 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 16 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.7.0 |
|
|
| aliases |
CVE-2024-2004
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tha5-fv3w-sub6 |
|
| 22 |
| url |
VCID-u4bx-xqb3-vuef |
| vulnerability_id |
VCID-u4bx-xqb3-vuef |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2398 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83544 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83457 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83472 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.8347 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83495 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83504 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83519 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83512 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83509 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2398 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://curl.se/docs/CVE-2024-2398.html |
| reference_id |
CVE-2024-2398.html |
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2398.html |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.7.0 |
| purl |
pkg:generic/curl.se/curl@8.7.0 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 2 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 3 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 4 |
| vulnerability |
VCID-75nw-4e2d-zqgg |
|
| 5 |
| vulnerability |
VCID-8m6a-ej6a-g3df |
|
| 6 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 7 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 8 |
| vulnerability |
VCID-hrsy-694u-2fec |
|
| 9 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 10 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 11 |
| vulnerability |
VCID-pwn6-j8vf-rufk |
|
| 12 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 13 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 14 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 15 |
| vulnerability |
VCID-wgma-bycg-1qb1 |
|
| 16 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.7.0 |
|
|
| aliases |
CVE-2024-2398
|
| risk_score |
3.9 |
| exploitability |
0.5 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u4bx-xqb3-vuef |
|
| 23 |
| url |
VCID-vbbv-k1r7-kkas |
| vulnerability_id |
VCID-vbbv-k1r7-kkas |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24629 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24442 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2451 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24526 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2447 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15224
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas |
|
| 24 |
| url |
VCID-wgma-bycg-1qb1 |
| vulnerability_id |
VCID-wgma-bycg-1qb1 |
| summary |
curl: curl netrc password leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76402 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76306 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76336 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76315 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76388 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76366 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76361 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://curl.se/docs/CVE-2024-11053.html |
| reference_id |
CVE-2024-11053.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-11053.html |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:generic/curl.se/curl@8.11.1 |
| purl |
pkg:generic/curl.se/curl@8.11.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-176a-agbw-hqdy |
|
| 1 |
| vulnerability |
VCID-26p8-15d6-kbb1 |
|
| 2 |
| vulnerability |
VCID-2cx5-1qnw-uufj |
|
| 3 |
| vulnerability |
VCID-5xp7-mcsa-uqd4 |
|
| 4 |
| vulnerability |
VCID-6we4-n888-6qhe |
|
| 5 |
| vulnerability |
VCID-8zks-th64-33b8 |
|
| 6 |
| vulnerability |
VCID-9mjz-apkm-g7h1 |
|
| 7 |
| vulnerability |
VCID-etzn-uhck-h7b2 |
|
| 8 |
| vulnerability |
VCID-ksap-zrmb-ebcu |
|
| 9 |
| vulnerability |
VCID-kt4b-7ffh-4bch |
|
| 10 |
| vulnerability |
VCID-mkyr-w79c-qqfz |
|
| 11 |
| vulnerability |
VCID-nvzd-v3bs-6qek |
|
| 12 |
| vulnerability |
VCID-qpux-jh6k-8qhx |
|
| 13 |
| vulnerability |
VCID-t9p4-2x7v-yfaq |
|
| 14 |
| vulnerability |
VCID-vbbv-k1r7-kkas |
|
| 15 |
| vulnerability |
VCID-x57x-w8g8-7ybz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.11.1 |
|
|
| aliases |
CVE-2024-11053
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wgma-bycg-1qb1 |
|
| 25 |
| url |
VCID-x57x-w8g8-7ybz |
| vulnerability_id |
VCID-x57x-w8g8-7ybz |
| summary |
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14524 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0715 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07177 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07151 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07206 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07237 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07234 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07222 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07212 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14524 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14524
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x57x-w8g8-7ybz |
|