Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
Typeapk
Namespacealpine
Namecurl
Version7.78.0-r0
Qualifiers
arch x86_64
distroversion v3.16
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.79.0-r0
Latest_non_vulnerable_version8.5.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-56wg-yafz-gkgx
vulnerability_id VCID-56wg-yafz-gkgx
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22922
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34891
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35035
published_at 2026-04-18T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35088
published_at 2026-04-02T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-04T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34995
published_at 2026-04-07T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35039
published_at 2026-04-08T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35067
published_at 2026-04-09T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35071
published_at 2026-04-11T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-12T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35012
published_at 2026-04-13T12:55:00Z
10
value 0.00146
scoring_system epss
scoring_elements 0.3505
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22922
2
reference_url https://curl.se/docs/CVE-2021-22922.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22922.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1213175
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://hackerone.com/reports/1213175
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981435
reference_id 1981435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981435
7
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
8
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
10
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://security.gentoo.org/glsa/202212-01
11
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
12
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
16
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
17
reference_url https://access.redhat.com/errata/RHSA-2021:3903
reference_id RHSA-2021:3903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3903
fixed_packages
0
url pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
purl pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.78.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=main
aliases CVE-2021-22922
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx
1
url VCID-hudt-78dw-tkf2
vulnerability_id VCID-hudt-78dw-tkf2
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.5496
published_at 2026-04-02T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.5489
published_at 2026-04-01T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.55017
published_at 2026-04-11T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.55005
published_at 2026-04-09T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.55006
published_at 2026-04-08T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54986
published_at 2026-04-04T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54956
published_at 2026-04-07T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62173
published_at 2026-04-13T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62224
published_at 2026-04-18T12:55:00Z
9
value 0.00424
scoring_system epss
scoring_elements 0.62217
published_at 2026-04-16T12:55:00Z
10
value 0.00424
scoring_system epss
scoring_elements 0.62194
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
2
reference_url https://curl.se/docs/CVE-2021-22925.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22925.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1223882
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url https://hackerone.com/reports/1223882
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
reference_id 1970902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
6
reference_url http://seclists.org/fulldisclosure/2021/Sep/39
reference_id 39
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/39
7
reference_url http://seclists.org/fulldisclosure/2021/Sep/40
reference_id 40
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url http://seclists.org/fulldisclosure/2021/Sep/40
8
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
9
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
10
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
11
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
12
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
13
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
14
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
15
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
16
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
17
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
18
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
19
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
21
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url https://security.gentoo.org/glsa/202212-01
22
reference_url https://support.apple.com/kb/HT212804
reference_id HT212804
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url https://support.apple.com/kb/HT212804
23
reference_url https://support.apple.com/kb/HT212805
reference_id HT212805
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url https://support.apple.com/kb/HT212805
24
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
25
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
26
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
27
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
28
reference_url https://usn.ubuntu.com/5021-2/
reference_id USN-5021-2
reference_type
scores
url https://usn.ubuntu.com/5021-2/
29
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
purl pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.78.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=main
aliases CVE-2021-22925
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2
2
url VCID-qbpd-star-6fgn
vulnerability_id VCID-qbpd-star-6fgn
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22923
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25873
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25766
published_at 2026-04-18T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25937
published_at 2026-04-02T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25978
published_at 2026-04-04T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25745
published_at 2026-04-07T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25816
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-09T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25879
published_at 2026-04-11T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25838
published_at 2026-04-12T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25782
published_at 2026-04-13T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25784
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22923
2
reference_url https://curl.se/docs/CVE-2021-22923.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22923.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1213181
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://hackerone.com/reports/1213181
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981438
reference_id 1981438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981438
7
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
8
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
10
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://security.gentoo.org/glsa/202212-01
11
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
12
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
13
reference_url https://access.redhat.com/errata/RHSA-2021:3903
reference_id RHSA-2021:3903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3903
fixed_packages
0
url pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
purl pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.78.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=main
aliases CVE-2021-22923
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn
3
url VCID-y32p-52ps-4ug4
vulnerability_id VCID-y32p-52ps-4ug4
summary
Use of Incorrectly-Resolved Name or Reference
libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
reference_id
reference_type
scores
0
value 0.00746
scoring_system epss
scoring_elements 0.73012
published_at 2026-04-01T12:55:00Z
1
value 0.00746
scoring_system epss
scoring_elements 0.73042
published_at 2026-04-04T12:55:00Z
2
value 0.00746
scoring_system epss
scoring_elements 0.73117
published_at 2026-04-18T12:55:00Z
3
value 0.00746
scoring_system epss
scoring_elements 0.73107
published_at 2026-04-16T12:55:00Z
4
value 0.00746
scoring_system epss
scoring_elements 0.73064
published_at 2026-04-13T12:55:00Z
5
value 0.00746
scoring_system epss
scoring_elements 0.7307
published_at 2026-04-12T12:55:00Z
6
value 0.00746
scoring_system epss
scoring_elements 0.73091
published_at 2026-04-11T12:55:00Z
7
value 0.00746
scoring_system epss
scoring_elements 0.73066
published_at 2026-04-09T12:55:00Z
8
value 0.00746
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-07T12:55:00Z
9
value 0.00746
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-08T12:55:00Z
10
value 0.00746
scoring_system epss
scoring_elements 0.73021
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
2
reference_url https://curl.se/docs/CVE-2021-22924.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22924.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1223565
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://hackerone.com/reports/1223565
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
reference_id 1981460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
reference_id 991492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
22
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
23
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
24
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
25
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
26
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
27
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
28
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
29
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
30
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
31
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
32
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
33
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
reference_id CVE-2021-22924
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
35
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://www.debian.org/security/2022/dsa-5197
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
37
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
38
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
39
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
40
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
44
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
45
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
46
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
47
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
reference_id ssa-732250.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
48
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
fixed_packages
0
url pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
purl pkg:apk/alpine/curl@7.78.0-r0?arch=x86_64&distroversion=v3.16&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.78.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=main
aliases CVE-2021-22924
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.78.0-r0%3Farch=x86_64&distroversion=v3.16&reponame=main