Lookup for vulnerable packages by Package URL.

GET /api/packages/413199?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
    "type": "apk",
    "namespace": "alpine",
    "name": "curl",
    "version": "7.51.0",
    "qualifiers": {
        "arch": "armhf",
        "distroversion": "v3.7",
        "reponame": "main"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "7.52.1",
    "latest_non_vulnerable_version": "7.61.1-r3",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34703?format=api",
            "vulnerability_id": "VCID-5jan-pqf6-fyhr",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81845",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81911",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81875",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81908",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81927",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81915",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81856",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81879",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8622"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8622.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8622.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386",
                    "reference_id": "1388386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8622"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34697?format=api",
            "vulnerability_id": "VCID-6muy-xpdq-9kg8",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88589",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88645",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88598",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88616",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88617",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88635",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8864",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88652",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8616"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8616.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8616.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371",
                    "reference_id": "1388371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8616"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34704?format=api",
            "vulnerability_id": "VCID-c6dk-7gj6-7far",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74617",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74662",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74621",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74647",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7469",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7467",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8623"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8623.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8623.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388",
                    "reference_id": "1388388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8623"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34705?format=api",
            "vulnerability_id": "VCID-e58m-g37d-9fd6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80023",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80073",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8003",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80052",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80042",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80069",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80078",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80082",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8624"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8624.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8624.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390",
                    "reference_id": "1388390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8624"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34701?format=api",
            "vulnerability_id": "VCID-j2cq-q3r9-jfcp",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74253",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74298",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74305",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74326",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74306",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74258",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74284",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7429",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8620"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8620.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8620.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388382",
                    "reference_id": "1388382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388382"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8620"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34702?format=api",
            "vulnerability_id": "VCID-jqqf-gmd3-ubcd",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84539",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84576",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8458",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84601",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84608",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84627",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84622",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8621"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8621.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8621.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385",
                    "reference_id": "1388385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8621"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34700?format=api",
            "vulnerability_id": "VCID-jtw4-af4y-nkbk",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86425",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8637",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86387",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86389",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86408",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86418",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8643",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8619"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8619.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8619.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379",
                    "reference_id": "1388379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8619"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34696?format=api",
            "vulnerability_id": "VCID-vxpj-xygq-9be2",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84774",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84789",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8481",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84832",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84839",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84857",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84854",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8615"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8615.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8615.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370",
                    "reference_id": "1388370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8615"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34699?format=api",
            "vulnerability_id": "VCID-vyk2-s5ut-ubbz",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81967",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82001",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81997",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82024",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82031",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82051",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81978",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8618"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8618.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378",
                    "reference_id": "1388378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8618"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34706?format=api",
            "vulnerability_id": "VCID-yxks-8529-23bj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8129",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81228",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81251",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8125",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81278",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81283",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81304",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8625"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8625.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8625.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392",
                    "reference_id": "1388392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8625"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34698?format=api",
            "vulnerability_id": "VCID-zxz2-xfpd-pbay",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19714",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19763",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19567",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19619",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19623",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8617"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8617.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8617.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377",
                    "reference_id": "1388377",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/413199?format=api",
                    "purl": "pkg:apk/alpine/curl@7.51.0?arch=armhf&distroversion=v3.7&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2016-8617"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/curl@7.51.0%3Farch=armhf&distroversion=v3.7&reponame=main"
}