Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/curl@0?arch=s390x&distroversion=edge&reponame=main |
| Type | apk |
| Namespace | alpine |
| Name | curl |
| Version | 0 |
| Qualifiers |
| arch |
s390x |
| distroversion |
edge |
| reponame |
main |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 7.36.0-r0 |
| Latest_non_vulnerable_version | 8.19.0-r0 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-d3s1-3qs7-2uhw |
| vulnerability_id |
VCID-d3s1-3qs7-2uhw |
| summary |
curl: Cipher settings shared for all connections when using schannel TLS backed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22897 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73936 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73894 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73855 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.7388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73851 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73899 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73921 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22897 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22897
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3s1-3qs7-2uhw |
|
| 1 |
| url |
VCID-kt4b-7ffh-4bch |
| vulnerability_id |
VCID-kt4b-7ffh-4bch |
| summary |
When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`
with the curl tool,curl should check the public key of the server certificate
to verify the peer.
This check was skipped in a certain condition that would then make curl allow
the connection without performing the proper check, thus not noticing a
possible impostor. To skip this check, the connection had to be done with QUIC
with ngtcp2 built to use GnuTLS and the user had to explicitly disable the
standard certificate verification. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13034 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01204 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.012 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0122 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01226 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0123 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01213 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01207 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01209 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01211 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13034 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13034
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kt4b-7ffh-4bch |
|
| 2 |
| url |
VCID-nvzd-v3bs-6qek |
| vulnerability_id |
VCID-nvzd-v3bs-6qek |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10292 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10237 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1026 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10399 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10366 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15079
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek |
|
| 3 |
| url |
VCID-vbbv-k1r7-kkas |
| vulnerability_id |
VCID-vbbv-k1r7-kkas |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24629 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24442 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2451 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24526 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2447 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15224
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@0%3Farch=s390x&distroversion=edge&reponame=main |