| 0 |
| url |
VCID-2cx5-1qnw-uufj |
| vulnerability_id |
VCID-2cx5-1qnw-uufj |
| summary |
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1965 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16802 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17194 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17246 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16949 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16923 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19316 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19223 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19261 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19232 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19246 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19144 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1965 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-1965.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-1965.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-1965
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj |
|
| 1 |
| url |
VCID-2szj-xvgq-pkfr |
| vulnerability_id |
VCID-2szj-xvgq-pkfr |
| summary |
curl: QUIC certificate check bypass with wolfSSL |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42584 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42672 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42641 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42704 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42726 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42691 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42674 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42735 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42724 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.4266 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2379 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://curl.se/docs/CVE-2024-2379.html |
| reference_id |
CVE-2024-2379.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2379.html |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-2379
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2szj-xvgq-pkfr |
|
| 2 |
| url |
VCID-4e1k-7bj9-hfch |
| vulnerability_id |
VCID-4e1k-7bj9-hfch |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23914 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31738 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31911 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31963 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31992 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31995 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31955 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31934 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31906 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32088 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23914 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-23914
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4e1k-7bj9-hfch |
|
| 3 |
| url |
VCID-4gze-cwtp-2bgr |
| vulnerability_id |
VCID-4gze-cwtp-2bgr |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23915 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13848 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1392 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13973 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1393 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13894 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13846 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13754 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13749 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13823 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13978 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14033 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13836 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23915 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-23915
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4gze-cwtp-2bgr |
|
| 4 |
| url |
VCID-4seq-hvbx-7fg8 |
| vulnerability_id |
VCID-4seq-hvbx-7fg8 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42298 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42478 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42459 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42434 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42362 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44723 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44703 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.4466 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44716 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44713 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46219 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46219
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4seq-hvbx-7fg8 |
|
| 5 |
| url |
VCID-56wg-yafz-gkgx |
| vulnerability_id |
VCID-56wg-yafz-gkgx |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22922 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34891 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34757 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35088 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35115 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34995 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35039 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35067 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35036 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35012 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.3505 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35035 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34988 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22922 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22922
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx |
|
| 6 |
| url |
VCID-6we4-n888-6qhe |
| vulnerability_id |
VCID-6we4-n888-6qhe |
| summary |
libcurl: Buffer Overflow in libcurl via zlib Integer Overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63305 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63314 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6327 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63306 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63856 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63788 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63815 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63772 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.6384 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0725 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-0725.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-0725.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0725
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe |
|
| 7 |
| url |
VCID-8zks-th64-33b8 |
| vulnerability_id |
VCID-8zks-th64-33b8 |
| summary |
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3784 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03037 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03053 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03081 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03044 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03792 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03683 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03709 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03659 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03671 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.06096 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3784 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3784.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3784.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3784
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8 |
|
| 8 |
| url |
VCID-ddgz-rczw-jqfw |
| vulnerability_id |
VCID-ddgz-rczw-jqfw |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28320 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67593 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67581 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67546 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6757 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67526 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00641 |
| scoring_system |
epss |
| scoring_elements |
0.70673 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00641 |
| scoring_system |
epss |
| scoring_elements |
0.70622 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28320 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28320
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw |
|
| 9 |
| url |
VCID-etzn-uhck-h7b2 |
| vulnerability_id |
VCID-etzn-uhck-h7b2 |
| summary |
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3783 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0352 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03521 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.035 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04277 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04175 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04144 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04152 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06397 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3783 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3783.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3783.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3783
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-etzn-uhck-h7b2 |
|
| 10 |
| url |
VCID-hrsy-694u-2fec |
| vulnerability_id |
VCID-hrsy-694u-2fec |
| summary |
curl: OCSP stapling bypass with GnuTLS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66655 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66606 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66638 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66626 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66629 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66644 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6663 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66587 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66559 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8096 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://curl.se/docs/CVE-2024-8096.html |
| reference_id |
CVE-2024-8096.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-8096.html |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-8096
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hrsy-694u-2fec |
|
| 11 |
| url |
VCID-mkyr-w79c-qqfz |
| vulnerability_id |
VCID-mkyr-w79c-qqfz |
| summary |
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14017 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00621 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00586 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00583 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00579 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00584 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00624 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.006 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00593 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00595 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00587 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14017 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14017
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz |
|
| 12 |
| url |
VCID-nvzd-v3bs-6qek |
| vulnerability_id |
VCID-nvzd-v3bs-6qek |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10292 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1032 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10399 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10237 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1034 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1026 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15079
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek |
|
| 13 |
| url |
VCID-pwn6-j8vf-rufk |
| vulnerability_id |
VCID-pwn6-j8vf-rufk |
| summary |
curl: HSTS subdomain overwrites parent cache entry |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9681 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72648 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72554 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72566 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.7259 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72562 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72605 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72615 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72606 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72522 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72539 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72515 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9681 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://curl.se/docs/CVE-2024-9681.html |
| reference_id |
CVE-2024-9681.html |
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-9681.html |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-9681
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pwn6-j8vf-rufk |
|
| 14 |
| url |
VCID-qbpd-star-6fgn |
| vulnerability_id |
VCID-qbpd-star-6fgn |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22923 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25873 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25683 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25816 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25868 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25879 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25782 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25784 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25766 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25738 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25937 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25978 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22923 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22923
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn |
|
| 15 |
| url |
VCID-qpux-jh6k-8qhx |
| vulnerability_id |
VCID-qpux-jh6k-8qhx |
| summary |
curl: Curl missing SFTP host verification with wolfSSH backend |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05467 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05252 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05309 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05274 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0526 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05246 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05191 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07117 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07019 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07151 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-10966
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpux-jh6k-8qhx |
|
| 16 |
| url |
VCID-vbbv-k1r7-kkas |
| vulnerability_id |
VCID-vbbv-k1r7-kkas |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24629 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24395 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2451 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24526 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2447 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24479 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24454 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24442 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15224
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas |
|
| 17 |
| url |
VCID-x57x-w8g8-7ybz |
| vulnerability_id |
VCID-x57x-w8g8-7ybz |
| summary |
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14524 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07226 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07206 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07237 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07234 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07222 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07212 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0715 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07127 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07251 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07177 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07151 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14524 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14524
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x57x-w8g8-7ybz |
|
| 18 |
| url |
VCID-xpss-yndr-mycj |
| vulnerability_id |
VCID-xpss-yndr-mycj |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43551 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12819 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12972 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12852 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12902 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12868 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12831 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12786 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1269 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12697 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12798 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12923 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43551 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-43551
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xpss-yndr-mycj |
|
| 19 |
| url |
VCID-yaas-j3qk-kfdg |
| vulnerability_id |
VCID-yaas-j3qk-kfdg |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42916 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14669 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14637 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25934 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25958 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26017 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26053 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26002 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25945 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25964 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31155 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31202 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42916 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42916
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yaas-j3qk-kfdg |
|