Lookup for vulnerable packages by Package URL.

Purlpkg:conan/libcurl@7.88.0
Typeconan
Namespace
Namelibcurl
Version7.88.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-ke81-x2ze-rbc5
vulnerability_id VCID-ke81-x2ze-rbc5
summary
Double Free
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27537
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14558
published_at 2026-04-09T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14539
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14609
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14504
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14506
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1908
published_at 2026-04-16T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-18T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.2156
published_at 2026-04-24T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21707
published_at 2026-04-21T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24288
published_at 2026-04-13T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24345
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27537
2
reference_url https://curl.se/docs/CVE-2023-27537.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27537.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1897203
reference_id
reference_type
scores
url https://hackerone.com/reports/1897203
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179097
reference_id 2179097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179097
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27537
reference_id CVE-2023-27537
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27537
7
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
fixed_packages
0
url pkg:conan/libcurl@8.0.1
purl pkg:conan/libcurl@8.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/libcurl@8.0.1
aliases CVE-2023-27537
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ke81-x2ze-rbc5
Fixing_vulnerabilities
Risk_score2.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:conan/libcurl@7.88.0